Conveying information secretly and establishing hidden relationship has been of interest since long past. Text documents have been widely used since very long time ago. Therefore, we have witnessed different method of...
详细信息
Conveying information secretly and establishing hidden relationship has been of interest since long past. Text documents have been widely used since very long time ago. Therefore, we have witnessed different method of hiding information in texts (text steganography) since past to the present. In this paper we introduce a new approach for steganography in Persian and Arabic texts. Considering the existence of too many points in Persian and Arabic phrases, in this approach, by vertical displacement of the points, we hide information in the texts. This approach can be categorized under feature coding methods. This method can be used for Persian/Arabic watermarking. Our method has been implemented by Java programming language
MPI (message passing interface) is the inter-node communication interface used in today PC clusters and other cluster-type parallel/distributed systems. Up-to-date the most popular analytical MPI performance model for...
详细信息
MPI (message passing interface) is the inter-node communication interface used in today PC clusters and other cluster-type parallel/distributed systems. Up-to-date the most popular analytical MPI performance model for parallel/distributed machines is the LogGP model, which is based on system hardware parameters. Recently, the improvements in connection network and communication protocols have lead to the dramatically changes in the contributions of hardware parameters to the model communication time. So LogGP model needs to be re-evaluated for its format and hardware parameters, to include the effect of message structures, which is in form of communication middleware overheads. In this paper, we use our experiment results to show that the current LogGP communication model is too limited for today parallel/distributed systems. We propose a modification by including into the model additional system parameters to represent middleware costs on non-contiguous data. We show in this paper our theoretical and experimental results for point-to-point communication, and explain how performance models for other communication patterns can be similarly created
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden commun...
详细信息
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the Internet. One of the methods introduced for establishing hidden communication is steganography. Methods of steganography have been mostly applied on images while the major characteristic of these methods is the change in the structure and features of the images so as not to be identifiable by human users. However, on the other hand, many methods have been proposed for breaking and extracting information (steganalysis) for these methods. This paper presents a method for hiding information in images by changing the appearance of the picture instead of changing its features. In this method, images of a number of relevant objects are put on a scene together in a way that is not noticeable. Then, by changing the place and type of each object, information is hidden in the image because the place and type of each object indicates a special figure and, by putting the digits figures together, the information in question is hidden in the picture. Considering that in this method information has been hidden in the appearance of the picture, then by using the present methods of identification of stegano images one cannot identify the steganography images in this method or extract data from them. The proposed method has been implemented by using the Java programming language
This paper is a unique approach to customer and developer interaction and bringing in a more friendly way of communication between them to gather the requirements more efficiently. This way benefits like requirement a...
详细信息
This paper is a unique approach to customer and developer interaction and bringing in a more friendly way of communication between them to gather the requirements more efficiently. This way benefits like requirement analysis, scope of the project, objective of the project and detection of errors in the project offering the greatest potential for improving requirements quality and avoiding cost overruns in the development of software systems, both for the customer(s) and the developers. We have proposed a number of extra features for the traditional FAst (facilitated application specification techniques), providing more benefits to both the parties than it is doing now. In our approach we have defined what the facilitator (the one who is responsible for conducting meetings between the two parties i.e. the customer and the developer) should really do and specifically who should it be, more over certain terms that can come in front in FAst meetings are looked upon and that how can one be careful about them, keeping things straight and simple between both the parties. Moreover verification and validation is provided in all the early stages of the software development, being discussed in every FAst meeting and monitored by the facilitator. This paper basically shows way of improving the software quality right from the beginning of the project to the end product
Meeting performance requirements is a challenging software engineering problem in designing and constructing middleware based applications. Considerable efforts have been spent to build performance analysis models fro...
详细信息
ISBN:
(纸本)1595934235
Meeting performance requirements is a challenging software engineering problem in designing and constructing middleware based applications. Considerable efforts have been spent to build performance analysis models from the application architectural models that can be applied before the implementation phase. Accurate analysis models require realistic performance data to be populated into the performance models, which represents the performance characteristics of the middleware and the application hosted by the middleware runtime environment. Benchmark applications are usually developed to collect these performance data. However, benchmark generation for middleware-based systems is a costly and time consuming process because of the complexity of programming models and technology specific features of different types of middleware. The paper proposes an approach to automate benchmark generation processes following Model Driven Development methodology, which aims to construct deployable benchmark applications from the high-level design models. A modelling language is designed specifically for performance testing domain by using the recently released Microsoft Domain Specific Language toolkit. This approach can be integrated into Visual studio 2005 Team System as a "plug in " to model and generate load testing suites. Copyright 2006 ACM.
For students in computer science, knowledge of programming domain needs to be organized and shared efficiently. In this paper, we propose a method to present programming domain knowledge with ontology. We develop the ...
详细信息
This paper first tells the rather unusual story of the acquisition of the first scientific computer by the University of Iceland. It then goes on to describe the efforts by the staff of the University Computing Centre...
详细信息
This paper discusses Gild: An open source, Eclipse-based IDE for teaching and learning programming. Gild was designed to simplify and add pedagogical support to the Eclipse IDE to make it more appropriate for novice p...
详细信息
This paper discusses Gild: An open source, Eclipse-based IDE for teaching and learning programming. Gild was designed to simplify and add pedagogical support to the Eclipse IDE to make it more appropriate for novice programmers and their instructors. Its development has greatly benefited from the ability to study, reuse, and modify existing Eclipse code. The core members of the Gild team are primarily researchers, making the maintenance of a growing code base difficult. It is challenging to create a community of developers because unlike most open source projects the developers (researchers) of Gild are not the main users (novice programmers) of Gild. To overcome this problem, we discuss techniques for making Gild more attractive to skilled developers (professors and graduate students). These techniques include improving instructor support in Gild and developing a grading perspective. We hope that these additions will attract able contributors and make Gild a self-sustaining community.
Autonomic Computing (AC), self-management based on high level guidance from humans, is increasingly gaining momentum as the way forward in designing reliable systems to hide complexity and conquer IT management costs....
详细信息
The digital rights management platforms (DRMps) are the web platforms employed by web content providers (CPs) to ensure the copyright protection of the digital contents they distribute on the Internet. However, the cu...
详细信息
暂无评论