BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
inform (15)
data (13)
imag (7)
improv (6)
latenc (6)

Stem hide$ (all stems)

66 papers:

DocEngDocEng-2015-WalgerH #multi
Hiding Information in Multiple Level-line Moirés (TW, RDH), pp. 21–24.
CHICHI-2015-ReevesGFBART
I’d Hide You: Performing Live Broadcasting in Public (SR, CG, MF, SB, MA, JRF, NT), pp. 2573–2582.
ITiCSEITiCSE-2014-Katai #algorithm #visualisation
Selective hiding for improved algorithmic visualization (ZK), pp. 33–38.
CHICHI-2014-TewariC #game studies #what
What did spot hide?: a question-answering game for preschool children (AT, JC), pp. 1807–1816.
SACSAC-2014-PetroccoCPE #performance
Hiding user content interest while preserving P2P performance (RP, MC, JAP, DHJE), pp. 501–508.
SACSAC-2014-SwamyIG #2d #image
Two level reversible data hiding in 2D images (NRS, SI, PG), pp. 58–59.
CHICHI-2013-HuangF #crowdsourcing #exclamation #social
Don’t hide in the crowd!: increasing social transparency between peer workers improves crowdsourcing outcomes (SWH, WTF), pp. 621–630.
DACDAC-2012-KimYL #latency #performance #ram
Write performance improvement by hiding R drift latency in phase-change RAM (YK, SY, SL), pp. 897–906.
LICSLICS-2012-McIverMM #information management #nondeterminism #probability
A Kantorovich-Monadic Powerdomain for Information Hiding, with Probability and Nondeterminism (AM, LM, CM), pp. 461–470.
KDDKDD-2011-Gkoulalas-DivanisL
Revisiting sequential pattern hiding to enhance utility (AGD, GL), pp. 1316–1324.
ECOOPECOOP-2011-OstermannGKR #composition #information management
Revisiting Information Hiding: Reflections on Classical and Nonclassical Modularity (KO, PGG, CK, TR), pp. 155–178.
ESOPESOP-2010-NaumannB #bound #first-order #higher-order #information management
Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions (DAN, AB), pp. 2–22.
TACASTACAS-2010-AndresPRS #information management
Computing the Leakage of Information-Hiding Systems (MEA, CP, PvR, GS), pp. 373–389.
ICPRICPR-2010-GuoZ #authentication #capacity #image
High Capacity Data Hiding for Binary Image Authentication (MG, HZ), pp. 1441–1444.
KDIRKDIR-2010-GokceA #algorithm #trade-off
A Tradeoff Balancing Algorithm for Hiding Sensitive Frequent Itemsets (HG, OA), pp. 200–205.
SACSAC-2010-DelisVT #approach #classification
A data perturbation approach to sensitive classification rule hiding (AD, VSV, AAT), pp. 605–609.
SACSAC-2010-WangLRKL #distributed #information management
Improving complex distributed software system availability through information hiding (LW, YL, SR, KAK, XL), pp. 452–456.
HPCAHPCA-2010-BiDG #energy
Delay-Hiding energy management mechanisms for DRAM (MB, RD, CG), pp. 1–10.
DACDAC-2009-GuQZ #design #information management
Information hiding for trusted system design (JG, GQ, QZ), pp. 698–701.
FMFM-2009-ReevesS #fault #robust #semantics
A Robust Semantics Hides Fewer Errors (SR, DS), pp. 499–515.
ASPLOSASPLOS-2009-ParkLZ #debugging #named
CTrigger: exposing atomicity violation bugs from their hiding places (SP, SL, YZ), pp. 25–36.
CCCC-2009-CampanoniSAC #compilation #jit #manycore
Dynamic Look Ahead Compilation: A Technique to Hide JIT Compilation Latencies in Multicore Environment (SC, MS, GA, SCR), pp. 220–235.
DATEDATE-2008-ParkSP #embedded #execution #using
Hiding Cache Miss Penalty Using Priority-based Execution for Embedded Processors (SP, AS, YP), pp. 1190–1195.
FoSSaCSFoSSaCS-2008-BraunCP #composition #information management
Compositional Methods for Information-Hiding (CB, KC, CP), pp. 443–457.
SASSAS-2008-PredaGV
Hiding Software Watermarks in Loop Structures (MDP, RG, EV), pp. 174–188.
ICALPICALP-C-2008-JareckiL #authentication #multi #performance
Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials (SJ, XL), pp. 715–726.
SEFMSEFM-2008-Giacobazzi08a #obfuscation
Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and Watermarking (RG), pp. 7–18.
ICPRICPR-2008-OhyamaNYN
Reversible data hiding of full color JPEG2000 compressed bit-stream preserving bit-depth information (SO, MN, KY, HN), pp. 1–4.
ICPRICPR-2008-XuanSCTTL #image
Reversible binary image data hiding by run-length histogram modification (GX, YQS, PC, XT, JT, JL), pp. 1–4.
LICSLICS-2008-Pottier #anti #higher-order
Hiding Local State in Direct Style: A Higher-Order Anti-Frame Rule (FP), pp. 331–340.
ASEASE-2007-Song #adaptation #composition
Adaptation hiding modularity (YS), pp. 551–554.
SIGMODSIGMOD-2007-NergizAC #database
Hiding the presence of individuals from shared databases (MEN, MA, CC), pp. 665–676.
VLDBVLDB-2007-SalperwyckABBPS #named
GhostDB: Hiding Data from Prying Eyes (CS, NA, MB, LB, PP, DS), pp. 1346–1349.
STOCSTOC-2007-HaitnerR #statistics
Statistically-hiding commitment from any one-way function (IH, OR), pp. 1–10.
ICSEICSE-2007-LeavensM #information management #interface #specification
Information Hiding and Visibility in Interface Specifications (GTL, PM), pp. 385–395.
CGOCGO-2007-MoseleySRGP #parallel #profiling
Shadow Profiling: Hiding Instrumentation Costs with Parallelism (TM, AS, VJR, DG, RP), pp. 198–208.
PPoPPPPoPP-2007-GuoDLLC #latency #multi #network #thread
Latency hiding through multithreading on a network processor (XG, JD, LL, ZL, PRC), pp. 130–131.
VMCAIVMCAI-2007-BallK #approximate #source code
Better Under-Approximation of Programs by Hiding Variables (TB, OK), pp. 314–328.
CIKMCIKM-2006-Gkoulalas-DivanisV #approach #integer #programming
An integer programming approach for frequent itemset hiding (AGD, VSV), pp. 748–757.
ICPRICPR-v4-2006-QuanZ #using
Data Hiding in MPEG Compressed Audio Using Wet Paper Codes (XQ, HZ), pp. 727–730.
SACSAC-2006-BodhuinCPT #complexity #physics
Hiding complexity and heterogeneity of the physical world in smart living environments (TB, GC, RP, MT), pp. 1921–1927.
DATEDATE-2005-FaroukS #algorithm #communication #encryption #hybrid #implementation #security
An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security (HAF, MS), pp. 76–81.
ESEC-FSEESEC-FSE-2005-SullivanGSCSTR #aspect-oriented #design #information management #interface
Information hiding interfaces for aspect-oriented design (KJS, WGG, YS, YC, MS, NT, HR), pp. 166–175.
CHICHI-2004-BaudischPB #usability #user interface
Flat volume control: improving usability by hiding the volume control hierarchy in the user interface (PB, JP, SB), pp. 255–262.
CSCWCSCW-2004-GolderD #game studies #online
Hiding and revealing in online poker games (SAG, JSD), pp. 370–373.
CSCWCSCW-2004-SchankH #collaboration #modelling #uml
Collaborative modeling: hiding UML and promoting data examples in NEMo (PKS, LH), pp. 574–577.
ICPRICPR-v4-2004-LiuC #adaptation #image
An Adaptive Data Hiding Technique for Binary Images (THL, LWC), pp. 831–834.
ICPRICPR-v4-2004-PeiZ #image #multi
Hiding Multiple Data in Color Images by Histogram Modification (SCP, YCZ), pp. 799–802.
ICPRICPR-v4-2004-YuWT04a #image
Steganalysis of Data Hiding in Binary Images (XY, YW, TT), pp. 877–880.
POPLPOPL-2004-OHearnYR #information management
Separation and information hiding (PWO, HY, JCR), pp. 268–280.
ASPLOSASPLOS-2004-ZhuangZP #framework #information management #named
HIDE: an infrastructure for efficiently protecting information leakage on the address bus (XZ, TZ, SP), pp. 72–84.
KDDKDD-2003-Jermaine #correlation #game studies
Playing hide-and-seek with correlations (CJ), pp. 559–564.
CGOCGO-2003-ZhangG #security #slicing
Hiding Program Slices for Software Security (XZ, RG), pp. 325–336.
ICPRICPR-v3-2002-JainUH #image
Hiding a Face in a Fingerprint Image (AKJ, UU, RLH), pp. 756–759.
FASEFASE-2001-MossakowskiAH #development #graph
Extending Development Graphs with Hiding (TM, SA, DH), pp. 269–283.
DACDAC-2000-WangKS #clustering #latency #memory management #scheduling
Optimal two level partitioning and loop scheduling for hiding memory latency for DSP applications (ZW, MK, EHMS), pp. 540–545.
CSMRCSMR-2000-BrilFGKW #algebra #multi #using
Hiding Expressed Using Relation Algebra with Multi-Relations — Oblique Lifting and Lowering for Unbalanced Systems (RJB, LMGF, AG, RLK, TW), pp. 33–44.
FMFM-v2-1999-GoguenR #algebra
Hiding More of Hidden Algebra (JAG, GR), pp. 1704–1719.
SIGMODSIGMOD-1996-MogiK #case study
Hot Mirroring: A Study to Hide Parity Upgrade Penalty and Degradations During Rebuilds for RAID5 (KM, MK), pp. 183–194.
STOCSTOC-1996-AndrewsLMZ #automation #latency #network
Automatic Methods for Hiding Latency in High Bandwidth Networks (Extended Abstract) (MA, FTL, PTM, LZ), pp. 257–265.
ASPLOSASPLOS-1996-BianchiniKPMAA #communication #latency
Hiding Communication Latency and Coherence Overhead in Software DSMs (RB, LIK, RP, MDM, MA, CLdA), pp. 198–209.
OOPSLAOOPSLA-1994-LortzS #contract #programming
Combining Contracts and Exemplar-Based Programming for Class Hiding and Customization (VBL, KGS), pp. 453–467.
ICSEICSE-1991-Banatre #distributed
Hiding Distribution in Distributed Systems (MB), pp. 189–196.
STOCSTOC-1990-FeigeS #protocol
Witness Indistinguishable and Witness Hiding Protocols (UF, AS), pp. 416–426.
STOCSTOC-1987-AbadiFK #on the
On Hiding Information from an Oracle (Extended Abstract) (MA, JF, JK), pp. 195–203.
DACDAC-1975-ThompsonB75a #implementation #logic #multi #re-engineering #simulation
The software engineering technique of data hiding as applied to multi-level model implementation of logical devices in digital simulation (EWT, NB), pp. 195–201.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.