Sciweavers

3773 search results - page 678 / 755
» Using Ontologies for Integrated Geographic Information Syste...
Sort
View
APCCAS
2002
IEEE
156views Hardware» more  APCCAS 2002»
15 years 9 months ago
Bit-plane watermarking for zerotree-coded images
In this paper, we develop a robust bit-plane watermarking technique based on zerotree coding. A robust watermark is an imperceptible but indelible code that can be used for owners...
Shih-Hsuan Yang, Hsin-Chang Chen
LISA
2001
15 years 5 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
WSC
2000
15 years 5 months ago
Understanding the impact of equipment and process changes with a heterogeneous semiconductor manufacturing simulation environmen
Simulation models are useful to predict and understand the impact of changes to a manufacturing system. Typical factory simulation models include the parts being manufactured in t...
Jeffrey W. Herrmann, Brian F. Conaghan, Laurent He...
JSW
2008
98views more  JSW 2008»
15 years 4 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
IJNSEC
2007
121views more  IJNSEC 2007»
15 years 4 months ago
Data Hiding in a Kind of PDF Texts for Secret Communication
In this paper, we present a novel steganographic technique for hiding data in a kind of PDF texts. We first point out the secret channels in a kind of PDF English texts, which ar...
Shangping Zhong, Xueqi Cheng, Tierui Chen