Sciweavers

657 search results - page 70 / 132
» Same technology, different outcome
Sort
View
IEEEIAS
2007
IEEE
14 years 2 months ago
An LSB Data Hiding Technique Using Prime Numbers
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1]. First we mathematically m...
Sandipan Dey, Ajith Abraham, Sugata Sanyal
ISCA
2007
IEEE
128views Hardware» more  ISCA 2007»
14 years 2 months ago
Performance and security lessons learned from virtualizing the alpha processor
Virtualization has become much more important throughout the computer industry both to improve security and to support multiple workloads on the same hardware with effective isola...
Paul A. Karger
IEEECIT
2005
IEEE
14 years 1 months ago
Effectively Maintaining Multiple View Consistency in Web Warehouses
To make a web warehouse reflect the real web accurately, we should keep timeliness, freshness and consistency for the webviews. This paper fouses on one important part of webview...
Yan Zhang, Xiangdong Qin
DSOM
2005
Springer
14 years 1 months ago
Utilization and SLO-Based Control for Dynamic Sizing of Resource Partitions
This paper deals with a shared server environment where the server is divided into a number of resource partitions and used to host multiple applications at the same time. In a cas...
Zhikui Wang, Xiaoyun Zhu, Sharad Singhal
WEBI
2005
Springer
14 years 1 months ago
A Semi-Supervised Document Clustering Algorithm Based on EM
Document clustering is a very hard task in Automatic Text Processing since it requires to extract regular patterns from a document collection without a priori knowledge on the cat...
Leonardo Rigutini, Marco Maggini