Information hiding

Results: 95



#Item
71Environment of the United States / Database management systems / Data mining / Database / Metadata / National Park Service / Redwood National and State Parks / Information / Data analysis / Data

National Park Service U.S. Department of the Interior Klamath Inventory and Monitoring Network Hiding in Plain Sight: Lessons Learned from Klamath Network Data Mining

Add to Reading List

Source URL: science.nature.nps.gov

Language: English - Date: 2011-05-04 16:49:13
72Technology / Social media / Real-time web / Text messaging / Websites / Hashtag / Andy Carvin / Internet privacy / Twitter usage / World Wide Web / Twitter / Information

Hiding in Plain Sight: A Tale of Trust and Mistrust inside a Community of Citizen Reporters Eni Mustafaraj Panagiotis Metaxas

Add to Reading List

Source URL: cs.wellesley.edu

Language: English - Date: 2012-05-08 06:21:16
73Science / Infographics / Information science / Software engineering / Automata theory / Finite-state machine / Structured analysis / State diagram / Data flow diagram / Models of computation / Diagrams / Data management

On Abstraction in Finite State Machine Models Michael Breen 12 September[removed]Draft) Abstract Information hiding is a long established principle in software engineering. However, in the context of finite state machines

Add to Reading List

Source URL: mbreen.com

Language: English - Date: 2012-02-22 06:55:47
74Object-oriented programming / Interfaces / Java programming language / Information hiding / Java / Class / Modular programming / Eiffel / User interface / Software engineering / Computing / Computer programming

design Editor: Martin Fowler ■ T h o u g h t Wo r k s

Add to Reading List

Source URL: martinfowler.com

Language: English - Date: 2014-06-27 16:29:56
75Security / Digital photography / Digital watermarking / Steganography / Audio watermark detection / Steganalysis / Watermark / Fingerprint / Microsoft Research / Watermarking / Cryptography / Espionage

Texte : Watermarking Document Images with Bounding Box Expansion Jack Brassil and Larry O’Gorman Information Hiding 1st International Workshop, June 1996

Add to Reading List

Source URL: mantis.free.fr

Language: English - Date: 2000-12-06 07:25:52
76Steganalysis / Salzburg / Multimedia / Visual arts / Security / Austria / Steganography / ACM Multimedia / Association for Computing Machinery

Call for Papers and Special Sessions IH&MMSec 2014 The 2nd Information Hiding and Multimedia Security Workshop* http://www.ihmmsec.org/ June 11-13, 2014 Salzburg, Austria

Add to Reading List

Source URL: www.sigmm.org

Language: English - Date: 2013-11-25 12:59:53
77Computing / Blogs / Social information processing / Stanley Aronowitz / Anonymous / Thesis / Project Chanology / Skill / Creativity / Internet / Internet culture / Information society

HIDING OUT: CREATIVE RESISTANCE AMONG ANONYMOUS WORKBLOGGERS by ABIGAIL SCHONEBOOM A dissertation submitted to the Graduate Faculty in Sociology in partial fulfillment of the

Add to Reading List

Source URL: www.abbyschoneboom.com

Language: English - Date: 2010-09-08 04:39:31
78Information hiding / Technology / Ultimate Fighting Championship / COSC / Web conferencing

SAME University June 8-12, 2009

Add to Reading List

Source URL: www.same.org

Language: English - Date: 2014-05-29 09:17:26
79Computer programming / Abstraction / Complex systems theory / Complexity / Systems / Transdisciplinarity / Information hiding / Software design / Design Patterns / Software engineering / Computing / Holism

Measuring Software Flexibility

Add to Reading List

Source URL: www.eden-study.org

Language: English - Date: 2007-03-23 20:31:50
80Software architecture / Object-oriented programming / Software design / Abstraction / Intensional statement / Information hiding / Computer programming / Computer program / Requirement / Computing / Programming paradigms / Software engineering

Abstraction Classes in Software Design

Add to Reading List

Source URL: eden-study.org

Language: English - Date: 2007-03-23 20:22:28
UPDATE