Results 301 to 303 of about 369,954 (303)
Some of the next articles are maybe not open access.
2003
This paper reviews recent research on information-theoretic aspects of information hiding. Emphasis is placed on applications requiring high payload (e.g., covert communications). Information hiding may be viewed as a game between two teams (embedder/decoder vs. attacker), and optimal information-embedding and attack strategies may be developed in this
openaire +2 more sources
This paper reviews recent research on information-theoretic aspects of information hiding. Emphasis is placed on applications requiring high payload (e.g., covert communications). Information hiding may be viewed as a game between two teams (embedder/decoder vs. attacker), and optimal information-embedding and attack strategies may be developed in this
openaire +2 more sources
2016
In this chapter, we try to find the P = UI equivalent to maintainable APIs. Our quest here is to unearth the essential forces behind changes, and to illuminate some techniques to control those changes. To make the whole discussion comprehensible, we also present a simulation about what typically happens in the software industry during development and ...
openaire +2 more sources
In this chapter, we try to find the P = UI equivalent to maintainable APIs. Our quest here is to unearth the essential forces behind changes, and to illuminate some techniques to control those changes. To make the whole discussion comprehensible, we also present a simulation about what typically happens in the software industry during development and ...
openaire +2 more sources
The Secret History of Information Hiding
2002The concept of "information-hiding" as a software design principle is widely accepted in academic circles. Many successful designs can be seen as successful applications of abstraction or information hiding. On the other hand, most industrial software developers do not apply the idea and many consider it unrealistic.
openaire +2 more sources