Sciweavers

909 search results - page 135 / 182
» Reversible data hiding
Sort
View
CORR
2007
Springer
141views Education» more  CORR 2007»
13 years 9 months ago
A Class of Parallel Tiled Linear Algebra Algorithms for Multicore Architectures
As multicore systems continue to gain ground in the High Performance Computing world, linear algebra algorithms have to be reformulated or new algorithms have to be developed in or...
Alfredo Buttari, Julien Langou, Jakub Kurzak, Jack...
PERVASIVE
2008
Springer
13 years 9 months ago
Context-aware routing in wireless mesh networks
Wireless mesh networks promise to deliver resilient connectivity among network nodes, allowing data to be relayed seamlessly between mobile clients and infrastructure. Routing is ...
Peizhao Hu, Marius Portmann, Ricky Robinson, Jadwi...
IJNSEC
2007
194views more  IJNSEC 2007»
13 years 9 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
CORR
2010
Springer
95views Education» more  CORR 2010»
13 years 8 months ago
M-Banking Security - a futuristic improved security approach
In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dream...
Geeta S. Navale, Swati S. Joshi, Aaradhana A. Desh...
JNCA
2010
106views more  JNCA 2010»
13 years 7 months ago
A methodology for engineering collaborative and ad-hoc mobile applications using SyD middleware
Today’s web applications are more collaborative and are using the standard and ubiquitous Internet protocols. We have earlier developed System on Mobile Devices (SyD) middleware...
Praveen Madiraju, Srilaxmi Malladi, Janaka Balasoo...