You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002. The 27 revised full papers presented were carefully selected during two rounds of reviewing and revision from 78 submissions. The papers are organized in topical sections on information hiding and networking, anonymity, fundamentals of watermarking, watermarking algorithms, attacks on watermarking algorithms, steganography algorithms, steganalysis, and hiding information in unusual content.
"System-Level Design Techniques for Energy-Efficient Embedded Systems will be of interest to advanced undergraduates, graduate students, and designers."--BOOK JACKET.
This book constitutes the thoroughly refereed post-proceedings of the 4th International Information Hiding Workshop, IHW 2001, held in Pittsburgh, PA, USA, in April 2001. The 29 revised full papers presented were carefully selected during two rounds of reviewing and revision. All current issues in information hiding are addressed including watermarking and fingerprinting of digitial audio, still image and video; anonymous communications; steganography and subliminal channels; covert channels; and database inference channels.
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.
"Presents the latest developments in the prgramming and design of programmable digital signal processors (PDSPs) with very-long-instruction word (VLIW) architecture, algorithm formulation and implementation, and modern applications for multimedia processing, communications, and industrial control."
The 2004 Information Security Conference was the seventh in a series that started with the Information Security Workshop in 1997. A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend c- tinuedintheprogramofthisyear’sconference.Theprogramcommitteereceived 106 submissions, from which 36 were selected for presentation. Each submission was reviewed by at least three experts in the relevant research area. We would liketothankalltheauthorsfortakingtheirtimetopreparethesubmissions,and wehopethatthosewhosepapersweredeclinedwillbeableto?ndanalternative forum for their work...
While conventional similar books focus on medical science and social aspects, this book emphasizes computing science and engineering design. This feature can help with both industry development and academic research. It book explains in detail both entire telehealthcare engineering system and individual hardware components. For example, it has circ
This book constitutes the refereed proceedings of the 5th International Workshop on Digital Watermarking Secure Data Management, IWDW 2006, held in Jeju Island, Korea in November 2006. The 34 revised full papers presented together with 3 invited lectures cover both theoretical and practical issues in digital watermarking.
This book constitutes the refereed proceedings of the Second International Conference on Distributed Computing in Sensor Systems, DCOSS 2006, held in San Francisco, California, USA, June 2006. The book presents 33 revised full papers, focusing on distributed computing issues in large-scale networked sensor systems. Coverage includes topics such as distributed algorithms and applications, programming support and middleware, data aggregation and dissemination, security, information fusion, lifetime maximization, and localization.
This textbook, now in its Second Edition, addresses the rapid advancements to the area of mobile computing. Almost every chapter has been revised to make the book up to date with the latest developments. It covers the main topics associated with mobile computing and wireless networking at a level that enables the students to develop a fundamental understanding of the technical issues involved in this new and fast emerging discipline. This book first examines the basics of wireless technologies and computer communications that form the essential infrastructure required for building knowledge in the area of mobile computations involving the study of invocation mechanisms at the client end, the...