Sciweavers

252 search results - page 33 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
HICSS
2007
IEEE
165views Biometrics» more  HICSS 2007»
13 years 10 months ago
A Study on Developing CRM Scorecard
As more firms embrace CRM as a core business strategy, it is getting more important to assess firms’ CRM readiness and performance for diagnosing, guiding, managing, and evaluat...
Hyung-Su Kim, Young-Gul Kim
ICA
2007
Springer
14 years 2 months ago
ICA in Boolean XOR Mixtures
We consider Independent Component Analysis (ICA) for the case of binary sources, where addition has the meaning of the boolean “Exclusive Or” (XOR) operation. Thus, each mixtur...
Arie Yeredor
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
13 years 12 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
SPIN
2009
Springer
14 years 3 months ago
Subsumer-First: Steering Symbolic Reachability Analysis
Abstract. Symbolic reachability analysis provides a basis for the verification of software systems by offering algorithmic support for the exploration of the program state space ...
Andrey Rybalchenko, Rishabh Singh
PERCOM
2004
ACM
14 years 8 months ago
Wi-Fi in Ad Hoc Mode: A Measurement Study
In this paper we investigate the performance of IEEE 802.11b ad hoc networks by means of an experimental study. This analysis reveals several aspects that are usually neglected in...
Giuseppe Anastasi, Eleonora Borgia, Marco Conti, E...