Sciweavers

731 search results - page 50 / 147
» Special Section on Information and Communication System Secu...
Sort
View
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
AICCSA
2008
IEEE
266views Hardware» more  AICCSA 2008»
14 years 3 months ago
A novel flow-sensitive type and effect analysis for securing C code
In this paper, we present a novel type and effect analysis for detecting type cast errors and memory errors in C source code. Our approach involves a type system with effect, regi...
Syrine Tlili, Mourad Debbabi
IJNSEC
2007
144views more  IJNSEC 2007»
13 years 8 months ago
IPLess Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems
The ability of communicating with a selected party anonymously is an important aspect of network security. Communicating anonymously means that no adversary can discern who is com...
Magdy Saeb, Meer Hamza, Ahmed El-Shikh
GLOBECOM
2010
IEEE
13 years 6 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
AAAI
1996
13 years 10 months ago
What Is Planning in the Presence of Sensing?
The Airport Example The Omelette Example Copyright c 1996 American Association for Artificial Intelligence. All rights reserved. Despite the existence of programs that are able to ...
Hector J. Levesque