Sciweavers

1795 search results - page 157 / 359
» Security Models and Information Flow
Sort
View
106
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Cryptographic measures in information hiding
Recent information hiding schemes are scrutinized in terms of their cryptographic performance. We establish conditions under which the key equivocation function is optimal for the...
Phillip A. Regalia
DBSEC
2007
106views Database» more  DBSEC 2007»
15 years 5 months ago
Enforcing Honesty in Assured Information Sharing Within a Distributed System
The growing number of distributed information systems such as the internet has created a need for security in data sharing. When several autonomous parties attempt to share data, t...
Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thur...
130
Voted
ICCCN
2007
IEEE
15 years 10 months ago
Motion-based Background Modeling for Moving Object Detection on Moving Platforms
— A method to detect moving objects on non-stationary background is proposed. The concurrent motions of foreground and background pixels make it extremely difficult to maintain a...
Ming-Yu Shih, Yao-Jen Chang, Bwo-Chau Fu, Chingchu...
WSC
2000
15 years 5 months ago
Automatic generation of simulation models from neutral libraries: an example
Researchers at the National Institute of Standards and Technology have proposed the development of neutral libraries of simulation components. The availability of such libraries w...
Young-Jun Son, Albert Jones, Richard A. Wysk
FIT
2010
14 years 11 months ago
Building AS-IS process models from task descriptions
Business processes have to adopt the changes driven by the market to remain competitive. This requires improvement of business processes, which can be carried out by understanding...
Azeem Lodhi, Gamal Kassem, Veit Köppen, Gunte...