Sciweavers

2259 search results - page 117 / 452
» Separation and information hiding
Sort
View
EKAW
2006
Springer
14 years 1 months ago
SemSearch: A Search Engine for the Semantic Web
Semantic search promises to produce precise answers to user queries by taking advantage of the availability of explicit semantics of information in the context of the semantic web....
Yuangui Lei, Victoria S. Uren, Enrico Motta
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 10 months ago
A Fragile Associative Watermarking on 2D Barcode for Data Authentication
Two-dimensional (2D) barcode has improved the information encoded capacity, and it also has enriched the applications of barcode technique. Recently, there are researches dealing ...
Jau-Ji Shen, Po-Wei Hsu
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 8 months ago
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
—In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper. In part...
Amitav Mukherjee, A. Lee Swindlehurst
IEEECIT
2010
IEEE
13 years 8 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
14 years 10 months ago
On privacy preservation against adversarial data mining
Privacy preserving data processing has become an important topic recently because of advances in hardware technology which have lead to widespread proliferation of demographic and...
Charu C. Aggarwal, Jian Pei, Bo Zhang 0002