Sciweavers

1744 search results - page 165 / 349
» The Steganographic File System
Sort
View
130
Voted
TSE
2008
99views more  TSE 2008»
15 years 3 months ago
Modular Information Hiding and Type-Safe Linking for C
This paper presents CMOD, a novel tool that provides a sound module system for C. CMOD works by enforcing a set of four rules that are based on principles of modular reasoning and...
Saurabh Srivastava, Michael Hicks, Jeffrey S. Fost...
180
Voted
NAR
2011
274views Computer Vision» more  NAR 2011»
14 years 10 months ago
A series of PDB related databases for everyday needs
The Protein Data Bank (PDB) is the world-wide repository of macromolecular structure information. We present a series of databases that run parallel to the PDB. Each database hold...
Robbie P. Joosten, Tim A. H. te Beek, Elmar Kriege...
125
Voted
DATE
2005
IEEE
141views Hardware» more  DATE 2005»
15 years 5 months ago
Multimedia Applications of Multiprocessor Systems-on-Chips
This paper surveys the characteristics of multimedia systems. Multimedia applications today are dominated by compression and decompression, but multimedia devices must also implem...
Wayne Wolf
138
Voted
LISA
1994
15 years 5 months ago
Adventures in the Evolution of a High-Bandwidth Network for Central Servers
In a small network, clients and servers may all be connected to a single Ethernet without significant performance concerns. As the number of clients on a network grows, the necess...
Karl L. Swartz, Roger Les Cottrell, Marty Dart
AP2PS
2009
IEEE
15 years 10 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...