Sciweavers

2259 search results - page 122 / 452
» Separation and information hiding
Sort
View
ACMICEC
2004
ACM
128views ECommerce» more  ACMICEC 2004»
14 years 3 months ago
Blind sales in electronic commerce
We start with the usual paradigm in electronic commerce: a consumer who wants to buy from a merchant. However, both parties wish to enjoy maximal privacy. In addition to remaining...
Esma Aïmeur, Gilles Brassard, Flavien Serge M...
VIZSEC
2004
Springer
14 years 3 months ago
Visualizing windows executable viruses using self-organizing maps
This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
InSeon Yoo
WPES
2003
ACM
14 years 3 months ago
Covert channels and anonymizing networks
There have long been threads of investigation into covert channels, and threads of investigation into anonymity, but these two closely related areas of information hiding have not...
Ira S. Moskowitz, Richard E. Newman, Daniel P. Cre...
KBSE
1997
IEEE
14 years 2 months ago
Applying Concept Formation Methods to Object Identification in Procedural Code
Legacy software systems present a high level of entropy combined with imprecise documentation. This makes their maintenance more difficult, more time consuming, and costlier. In o...
Houari A. Sahraoui, Walcélio L. Melo, Hakim...
IUI
1997
ACM
14 years 2 months ago
Evaluating the Utility and Usability of an Adaptive Hypermedia System
We have evaluated an adaptive hypermedia system, PUSH, and compared it to a non-adaptive variant of the same system. Based on an inferred information-seeking task, PUSH chooses wh...
Kristina Höök