Sciweavers

1931 search results - page 119 / 387
» Why we blog
Sort
View
ISCAS
2002
IEEE
190views Hardware» more  ISCAS 2002»
14 years 3 months ago
Analysis and improvement of correlation-based watermarking methods for digital images
This paper aims to design robust correlation-based watermarking methods for images. We rst present a model of watermark embedding and extracting processes and carry out their ana...
Akio Miyazaki, Akihiro Okamoto
ISCC
2002
IEEE
14 years 2 months ago
Session level rollback recovery
The problem of rollback recovery is traditionally approached using a model oriented to packet delivery. Instead, we introduce a model centered around complex sessions, and we expl...
Augusto Ciuffoletti
NDSS
2000
IEEE
14 years 2 months ago
A Lightweight Tool for Detecting Web Server Attacks
We present an intrusion-detection tool aimed at protecting web servers, and justify why such a tool is needed. We describe several interesting features, such as the ability to run...
Magnus Almgren, Hervé Debar, Marc Dacier
ASIACRYPT
1999
Springer
14 years 2 months ago
Linear Complexity versus Pseudorandomness: On Beth and Dai's Result
Abstract. Beth and Dai studied in their Eurocrypt paper [1] the relationship between linear complexity (that is, the length of the shortest Linear Feedback Shift Register that gene...
Yongge Wang
ESEC
1993
Springer
14 years 2 months ago
Databases for Software Engineering Environments - The Goal has not yet been attained
We argue that, despite a substantial number of proposed and existing new database systems, a suitable database system for software development environments and especially process-c...
Wolfgang Emmerich, Wilhelm Schäfer, Jim Welsh