Sciweavers

210 search results - page 19 / 42
» Research on Data Hiding Capacity
Sort
View
VR
2008
IEEE
103views Virtual Reality» more  VR 2008»
14 years 4 months ago
VFire: Virtual Fire in Realistic Environments
The destructive capacity of wildfires and the dangers and limitations associated with observing actual wildfires has led researchers to develop mathematical models in order to b...
Roger V. Hoang, Joseph D. Mahsman, David T. Brown,...
WWIC
2007
Springer
109views Communications» more  WWIC 2007»
14 years 3 months ago
QoS and Authentication Experiences in a Residential Environment Within a Broadband Access Framework
It is sometimes believed that a “broadband access” network, providing ample transmission capacity to residential environments, is enough so as to allow a flawless delivery of a...
Iván Vidal, Francisco Valera, Jaime Garc&ia...
NDSS
2009
IEEE
14 years 4 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee
OSDI
2004
ACM
14 years 10 months ago
Energy-Efficiency and Storage Flexibility in the Blue File System
A fundamental vision driving pervasive computing research is access to personal and shared data anywhere at anytime. In many ways, this vision is close to being realized. Wireless...
Edmund B. Nightingale, Jason Flinn
BIBM
2008
IEEE
144views Bioinformatics» more  BIBM 2008»
14 years 4 months ago
PhyQL: A Web-Based Phylogenetic Visual Query Engine
Biologists are often interested to query published phylogenetic data for research purposes. PhyQL, a web-based visual phylogenetic query engine, can be quite useful on this regard...
Shahriyar Hossain, Munirul Islam, Jesmin, Hasan M....