Sciweavers

2846 search results - page 560 / 570
» Not one click for security
Sort
View
136
Voted
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 3 months ago
Colour Guided Colour Image Steganography
Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and...
R. Amirtharajan, Sandeep Kumar Behera, Motamarri A...
DEBU
2008
149views more  DEBU 2008»
15 years 3 months ago
Semantics enhanced Services: METEOR-S, SAWSDL and SA-REST
Services Research Lab at the Knoesis center and the LSDIS lab at University of Georgia have played a significant role in advancing the state of research in the areas of workflow m...
Amit P. Sheth, Karthik Gomadam, Ajith Ranabahu
ARTMED
2006
86views more  ARTMED 2006»
15 years 3 months ago
Spatiotemporal reasoning about epidemiological data
Objective. In this article, we propose new methods to visualize and reason about spatiotemporal epidemiological data. Background. Efficient computerized reasoning about epidemics ...
Peter Z. Revesz, Shasha Wu
COMCOM
2006
154views more  COMCOM 2006»
15 years 3 months ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
CCR
2007
119views more  CCR 2007»
15 years 3 months ago
Exploiting KAD: possible uses and misuses
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating ...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...