Sciweavers

1834 search results - page 359 / 367
» Public Key Cryptography
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 7 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
CSCW
2007
ACM
13 years 7 months ago
Supporting Community Emergency Management Planning through a Geocollaboration Software Architecture
Emergency management is more than just events occurring within an emergency situation. It encompasses a variety of persistent activities such as planning, training, assessment, and...
Wendy A. Schafer, Craig H. Ganoe, John M. Carroll
JOT
2008
136views more  JOT 2008»
13 years 7 months ago
The Stock Statistics Parser
This paper describes how use the HTMLEditorKit to perform web data mining on stock statistics for listed firms. Our focus is on making use of the web to get information about comp...
Douglas Lyon
JOT
2008
114views more  JOT 2008»
13 years 7 months ago
By students, for students: a production-quality multimedia library and its application to game-based teaching
The attractive idea of using game development for teaching programming can only meet student expectations and modern software engineering requirements if it uses advanced multimed...
Till G. Bay, Michela Pedroni, Bertrand Meyer
MONET
2006
139views more  MONET 2006»
13 years 7 months ago
Market Driven Dynamic Spectrum Allocation over Space and Time among Radio-Access Networks: DVB-T and B3G CDMA with Heterogeneous
The radio frequency spectrum is a naturally limited resource of extraordinary value, as the key to the provision of important communication and information services. Traditionally,...
Virgilio Rodriguez, Klaus Moessner, Rahim Tafazoll...