Sciweavers

909 search results - page 134 / 182
» Reversible data hiding
Sort
View
IFIP11
2004
141views Business» more  IFIP11 2004»
13 years 10 months ago
Identity Management for Self-Portrayal
Identity management systems help users to organise their digital profiles in order to communicate parts of them, whenever needed and wanted, to communication partners like internet...
Tobias Baier, Christian P. Kunze
DIMVA
2010
13 years 9 months ago
dAnubis - Dynamic Device Driver Analysis Based on Virtual Machine Introspection
Abstract. In the escalating arms race between malicious code and security tools designed to analyze it, detect it or mitigate its impact, malicious code running inside the operatin...
Matthias Neugschwandtner, Christian Platzer, Paolo...
CORR
2008
Springer
126views Education» more  CORR 2008»
13 years 9 months ago
3D Building Model Fitting Using A New Kinetic Framework
We describe a new approach to fit the polyhedron describing a 3D building model to the point cloud of a Digital Elevation Model (DEM). We introduce a new kinetic framework that hi...
Mathieu Brédif, Didier Boldo, Marc Pierrot ...
COMSUR
2007
101views more  COMSUR 2007»
13 years 9 months ago
A survey of covert channels and countermeasures in computer network protocols
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to ...
Sebastian Zander, Grenville J. Armitage, Philip Br...
CONCURRENCY
2007
109views more  CONCURRENCY 2007»
13 years 9 months ago
The Open Grid Computing Environments collaboration: portlets and services for science gateways
: We review the efforts of the Open Grid Computing Environments collaboration. By adopting a general three-tiered architecture based on common standards for portlets and Grid Web S...
Jay Alameda, Marcus Christie, Geoffrey Fox, Joe Fu...