Robust lossless data hiding (LDH) methods have attracted more and more attentions for copyright protection of multimedia in lossy environment. One of the important requirements of...
While most research on XSS defense has focused on techniques for securing existing applications and re-architecting browser mechanisms, sanitization remains the industry-standard d...
Joel Weinberger, Prateek Saxena, Devdatta Akhawe, ...
The relationships and work that facilitate content creation in large online contributor system are not always visible. Social translucence is a stance toward the design of systems...
The use of real-time systems can differ from their initial design and requirements. New missions may take place in a more agressive environment and cause faults that are not manag...
Calculating the worst-case execution time (WCET) of real-time tasks is still a tedious job. Programmers are required to provide additional information on the program flow, analyzi...