Sciweavers

933 search results - page 129 / 187
» Secure Software Architectures Design by Aspect Orientation
Sort
View
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
14 years 3 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
QOSA
2007
Springer
14 years 3 months ago
Reusable Architectural Decision Models for Enterprise Application Development
Abstract. In enterprise application development and other software construction projects, a critical success factor is to make sound architectural decisions. Text templates and too...
Olaf Zimmermann, Thomas Gschwind, Jochen Malte K&u...
DSD
2010
IEEE
190views Hardware» more  DSD 2010»
13 years 9 months ago
Hardware-Based Speed Up of Face Recognition Towards Real-Time Performance
— Real-time face recognition by computer systems is required in many commercial and security applications because it is the only way to protect privacy and security in the sea of...
I. Sajid, Sotirios G. Ziavras, M. M. Ahmed
CCR
2010
97views more  CCR 2010»
13 years 6 months ago
On building special-purpose social networks for emergency communication
In this paper we propose a system that will allow people to communicate their status with friends and family when they find themselves caught up in a large disaster (e.g., sending...
Mark Allman
EDO
2005
Springer
14 years 2 months ago
Striving for versatility in publish/subscribe infrastructures
Publish/subscribe infrastructures are used as the basic communication and integration framework in many application domains. The majority of those infrastructures, however, fall s...
Roberto Silveira Silva Filho, David F. Redmiles