This paper proposes an efficient hardware/software system that significantly enhances software security through diversified replication on multi-cores. Recent studies show that a ...
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modi e...
: The experience from years of development and use, the advance of technology, and the development of authoring tools for questions and tests has resulted in a sophisticated, compu...
Antonella Carbonaro, Giorgio Casadei, Simone Riccu...
In this paper, we present the system MULINEX, a fully implemented system which supports cross-lingual search of the WWW. Users can formulate, expand and disambiguate queries, filt...
Joanne Capstick, Abdel Kader Diagne, Gregor Erbach...
Information systems (IS) research often attempts to examine and explain how technology leads to outcomes through usage of information technology (IT). Although extensive research ...
Dominic M. Thomas, Saurabh Gupta, Robert P. Bostro...