Sciweavers

909 search results - page 67 / 182
» Reversible data hiding
Sort
View
SOCIALCOM
2010
13 years 5 months ago
A Multi-factor Approach to Securing Software on Client Computing Platforms
Protecting the integrity of software platforms, especially in unmanaged consumer computing systems is a difficult problem. Attackers may attempt to execute buffer overflow attacks ...
Raghunathan Srinivasan, Vivek Iyer, Amit Kanitkar,...
ICUMT
2009
13 years 8 months ago
Two-layer network coordinate system for Internet distance prediction
Network coordinate (NC) system is an efficient and scalable system for Internet distance prediction. In this paper, we propose 3 two-layer NC systems HNPS, HBBS and HIDES derived f...
Chengbo Dong, Guodong Wang, Xuan Zhang, Beixing De...
WCRE
2007
IEEE
14 years 4 months ago
Parametric Process Model Inference
Legacy applications can be difficult and time-consuming to understand and update due to the lack of modern abstraction mechanisms in legacy languages, as well as the gradual dete...
Saurabh Sinha, G. Ramalingam, Raghavan Komondoor
DEXAW
2009
IEEE
114views Database» more  DEXAW 2009»
14 years 2 months ago
A Meta-Framework for Generating Ontologies from Legacy Schemas
A huge amount of schemas are expressed within outdated schema languages which are restricted concerning expressiveness, extensibility, readability, and understandability. Consequen...
Manuel Wimmer
JMLR
2010
152views more  JMLR 2010»
13 years 5 months ago
Bayesian Generalized Kernel Models
We propose a fully Bayesian approach for generalized kernel models (GKMs), which are extensions of generalized linear models in the feature space induced by a reproducing kernel. ...
Zhihua Zhang, Guang Dai, Donghui Wang, Michael I. ...