Sciweavers

2416 search results - page 69 / 484
» The design and implementation of typed scheme
Sort
View
ISCAS
2007
IEEE
143views Hardware» more  ISCAS 2007»
14 years 3 months ago
Effect of Recompression on Attacking JPEG Steganographic Schemes An Experimental Study
—In the implementation of a few JPEG steganographic schemes such as OutGuess and F5, an additional JPEG compression may take place before data embedding. The effect of this recom...
Yun Q. Shi, Chunhua Chen, Wen Chen, Maala P. Kaund...
ICWE
2003
Springer
14 years 1 months ago
X-SHAAD: An XML Implementation for Hypermedia Systems Modeling through SHAAD
Abstract. In this paper we present an implementation using XML and Java (XSHAAD) based on a modular architecture of SHAAD to support a web-based Adaptive Hypermedia System. This ar...
David Mérida, Ramón Fabregat, Carlos...
DSD
2002
IEEE
73views Hardware» more  DSD 2002»
14 years 1 months ago
Implementation of a Streaming Execution Unit
The Complex Streamed Instruction (CSI) set is an instruction set extension targeted at multimedia applications. CSI instructions process two-dimensional data streams stored in mem...
Dmitry Cheresiz, Ben H. H. Juurlink, Stamatis Vass...
DSN
2000
IEEE
14 years 1 months ago
Implementing Flexible Object Group Invocation in Networked Systems
Distributed applications should be able to make use of an object group service in a number of application specific ways. Three main modes of interactions can be identified: (i) re...
Graham Morgan, Santosh K. Shrivastava
CRYPTO
1989
Springer
87views Cryptology» more  CRYPTO 1989»
14 years 24 days ago
Practical Problems with a Cryptographic Protection Scheme
Z is a software system designed to provide media-transparent network services on a collection of UNIX® machines. These services are comprised of file transfer and command executi...
Jonathan M. Smith