Sciweavers

1744 search results - page 104 / 349
» The Steganographic File System
Sort
View
ICASSP
2010
IEEE
13 years 7 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
13 years 7 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
OSDI
2008
ACM
14 years 10 months ago
Predicting Computer System Failures Using Support Vector Machines
Mitigating the impact of computer failure is possible if accurate failure predictions are provided. Resources, applications, and services can be scheduled around predicted failure...
Errin W. Fulp, Glenn A. Fink, Jereme N. Haack
SEKE
2005
Springer
14 years 3 months ago
Javawock: A Java Class Recommender System Based on Collaborative Filtering
- Many software development platforms provide a large number of library components to make it easy to build high quality software. On the other hand, it became more and more diffic...
Masateru Tsunoda, Takeshi Kakimoto, Naoki Ohsugi, ...
MSS
1999
IEEE
203views Hardware» more  MSS 1999»
14 years 1 months ago
Improved Adaptive Replacement Algorithm for Disk-Caches in HSM Systems
With an ever increasing amount of data to store, hierarchical storage management (HSM) systems must still use tape for tertiary storage. A disk cache is used to reduce the access ...
Ulrich Hahn, Werner Dilling, Dietmar Kaletta