Sciweavers

210 search results - page 30 / 42
» Research on Data Hiding Capacity
Sort
View
USENIX
1994
13 years 11 months ago
Splicing UNIX into a Genome Mapping Laboratory
The Whitehead Institute/MIT Center for Genome Research is responsible for a number of large genome mapping efforts, the scale of which create problems of data and workflow managem...
Lincoln Stein, Andre Marquis, Robert Dredge, Mary ...
GRID
2007
Springer
13 years 9 months ago
Introduce: An Open Source Toolkit for Rapid Development of Strongly Typed Grid Services
Abstract Service-oriented architectures and applications have gained wide acceptance in the Grid computing community. A number of tools and middleware systems have been developed t...
Shannon Hastings, Scott Oster, Stephen Langella, D...
TON
2012
12 years 9 days ago
A New Cell-Counting-Based Attack Against Tor
Abstract—Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communicat...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
ICPPW
2003
IEEE
14 years 3 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
14 years 4 months ago
Operationalised Business Intelligence: Knowledge Sharing with an Enterprise Ambition at the Amsterdam-Amstelland Police Departme
In this article we describe the operationalised Business Intelligence (BI) environment of the Amsterdam-Amstelland Police Department (AAPD) as it presented itself in the spring of...
Stijn Viaene, Luc Lutin, Steven De Hertogh