Sciweavers

2237 search results - page 302 / 448
» Storing information with extractors
Sort
View
ICMCS
2007
IEEE
136views Multimedia» more  ICMCS 2007»
14 years 5 months ago
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image
Some (k, n)-threshold image secret sharing schemes encrypt the secret image into n noise-like shadow images with size 1/k times that of the original secret image. The small size o...
Ching-Nung Yang, Tse-Shih Chen
ICNSC
2007
IEEE
14 years 5 months ago
Adaptive Network Flow Clustering
— Flow level measurements are used to provide insights into the traffic flow crossing a network link. However, existing flow based network detection devices lack adaptive reconfi...
Sui Song, Zhixiong Chen
ICSNC
2007
IEEE
14 years 5 months ago
Advanced Querying Architecture for DICOM Systems
Radiology, which deals with medical images for diagnosis purposes, has seen a lot of improvements during the last decades thanks to information technology. The migration from stud...
Rui Agostinho, Manuela Pereira, Mário M. Fr...
IEEEARES
2007
IEEE
14 years 5 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
IEEEPACT
2007
IEEE
14 years 5 months ago
Unified Architectural Support for Soft-Error Protection or Software Bug Detection
In this paper we propose a unified architectural support that can be used flexibly for either soft-error protection or software bug detection. Our approach is based on dynamically...
Martin Dimitrov, Huiyang Zhou