Sciweavers

2257 search results - page 284 / 452
» Secure program partitioning
Sort
View
GRID
2006
Springer
13 years 10 months ago
Snapshot Processing in Streaming Environments
Monitoring and correlation of streaming data from multiple sources is becoming increasingly important in many application areas. Example applications include automated commodities...
Daniel M. Zimmerman, K. Mani Chandy
JMM2
2008
130views more  JMM2 2008»
13 years 10 months ago
A Robust Image Watermarking Scheme using Singular Value Decomposition
This paper presents a robust image watermarking scheme for multimedia copyright protection. In this work, host image is partitioned into four sub images. Watermark image such as `l...
B. Chandra Mohan, S. Srinivas Kumar
TKDE
2008
154views more  TKDE 2008»
13 years 9 months ago
Watermarking Relational Databases Using Optimization-Based Techniques
Proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environments and in many content distribution applications. In th...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
ICC
2011
IEEE
269views Communications» more  ICC 2011»
12 years 10 months ago
Experimental Evaluation of Memory Management in Content-Centric Networking
Abstract—Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and...
Giovanna Carofiglio, Vinicius Gehlen, Diego Perino
ACSAC
2009
IEEE
14 years 5 months ago
Surgically Returning to Randomized lib(c)
—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X) and address space layout randomization (ASLR) are typically used in combination. T...
Giampaolo Fresi Roglia, Lorenzo Martignoni, Robert...