Sciweavers

210 search results - page 16 / 42
» Research on Data Hiding Capacity
Sort
View
COMSUR
2007
101views more  COMSUR 2007»
13 years 9 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
IV
2006
IEEE
149views Visualization» more  IV 2006»
14 years 3 months ago
Challenges in Visual Data Analysis
In today’s applications data is produced at unprecedented rates. While the capacity to collect and store new data rapidly grows, the ability to analyze these data volumes increa...
Daniel A. Keim, Florian Mansmann, Jörn Schnei...
CSB
2005
IEEE
210views Bioinformatics» more  CSB 2005»
14 years 3 months ago
Problem Solving Environment Approach to Integrating Diverse Biological Data Sources
Scientists face an ever-increasing challenge in investigating biological systems with high throughput experimental methods such as mass spectrometry and gene arrays because of the...
Eric G. Stephan, Kyle R. Klicker, Mudita Singhal, ...
SIGMETRICS
2009
ACM
157views Hardware» more  SIGMETRICS 2009»
14 years 4 months ago
Delay tolerant bulk data transfers on the internet
Many emerging scientific and industrial applications require transferring multiple Tbytes of data on a daily basis. Examples include pushing scientific data from particle accele...
Nikolaos Laoutaris, Georgios Smaragdakis, Pablo Ro...
WMPI
2004
ACM
14 years 3 months ago
A compressed memory hierarchy using an indirect index cache
Abstract. The large and growing impact of memory hierarchies on overall system performance compels designers to investigate innovative techniques to improve memory-system efficienc...
Erik G. Hallnor, Steven K. Reinhardt