66 papers:
DocEng-2015-WalgerH #multi- Hiding Information in Multiple Level-line Moirés (TW, RDH), pp. 21–24.
CHI-2015-ReevesGFBART- I’d Hide You: Performing Live Broadcasting in Public (SR, CG, MF, SB, MA, JRF, NT), pp. 2573–2582.
ITiCSE-2014-Katai #algorithm #visualisation- Selective hiding for improved algorithmic visualization (ZK), pp. 33–38.
CHI-2014-TewariC #game studies #what- What did spot hide?: a question-answering game for preschool children (AT, JC), pp. 1807–1816.
SAC-2014-PetroccoCPE #performance- Hiding user content interest while preserving P2P performance (RP, MC, JAP, DHJE), pp. 501–508.
SAC-2014-SwamyIG #2d #image- Two level reversible data hiding in 2D images (NRS, SI, PG), pp. 58–59.
CHI-2013-HuangF #crowdsourcing #exclamation #social- Don’t hide in the crowd!: increasing social transparency between peer workers improves crowdsourcing outcomes (SWH, WTF), pp. 621–630.
DAC-2012-KimYL #latency #performance #ram- Write performance improvement by hiding R drift latency in phase-change RAM (YK, SY, SL), pp. 897–906.
LICS-2012-McIverMM #information management #nondeterminism #probability- A Kantorovich-Monadic Powerdomain for Information Hiding, with Probability and Nondeterminism (AM, LM, CM), pp. 461–470.
KDD-2011-Gkoulalas-DivanisL- Revisiting sequential pattern hiding to enhance utility (AGD, GL), pp. 1316–1324.
ECOOP-2011-OstermannGKR #composition #information management- Revisiting Information Hiding: Reflections on Classical and Nonclassical Modularity (KO, PGG, CK, TR), pp. 155–178.
ESOP-2010-NaumannB #bound #first-order #higher-order #information management- Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions (DAN, AB), pp. 2–22.
TACAS-2010-AndresPRS #information management- Computing the Leakage of Information-Hiding Systems (MEA, CP, PvR, GS), pp. 373–389.
ICPR-2010-GuoZ #authentication #capacity #image- High Capacity Data Hiding for Binary Image Authentication (MG, HZ), pp. 1441–1444.
KDIR-2010-GokceA #algorithm #trade-off- A Tradeoff Balancing Algorithm for Hiding Sensitive Frequent Itemsets (HG, OA), pp. 200–205.
SAC-2010-DelisVT #approach #classification- A data perturbation approach to sensitive classification rule hiding (AD, VSV, AAT), pp. 605–609.
SAC-2010-WangLRKL #distributed #information management- Improving complex distributed software system availability through information hiding (LW, YL, SR, KAK, XL), pp. 452–456.
HPCA-2010-BiDG #energy- Delay-Hiding energy management mechanisms for DRAM (MB, RD, CG), pp. 1–10.
DAC-2009-GuQZ #design #information management- Information hiding for trusted system design (JG, GQ, QZ), pp. 698–701.
FM-2009-ReevesS #fault #robust #semantics- A Robust Semantics Hides Fewer Errors (SR, DS), pp. 499–515.
ASPLOS-2009-ParkLZ #debugging #named- CTrigger: exposing atomicity violation bugs from their hiding places (SP, SL, YZ), pp. 25–36.
CC-2009-CampanoniSAC #compilation #jit #manycore- Dynamic Look Ahead Compilation: A Technique to Hide JIT Compilation Latencies in Multicore Environment (SC, MS, GA, SCR), pp. 220–235.
DATE-2008-ParkSP #embedded #execution #using- Hiding Cache Miss Penalty Using Priority-based Execution for Embedded Processors (SP, AS, YP), pp. 1190–1195.
FoSSaCS-2008-BraunCP #composition #information management- Compositional Methods for Information-Hiding (CB, KC, CP), pp. 443–457.
SAS-2008-PredaGV- Hiding Software Watermarks in Loop Structures (MDP, RG, EV), pp. 174–188.
ICALP-C-2008-JareckiL #authentication #multi #performance- Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials (SJ, XL), pp. 715–726.
SEFM-2008-Giacobazzi08a #obfuscation- Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and Watermarking (RG), pp. 7–18.
ICPR-2008-OhyamaNYN- Reversible data hiding of full color JPEG2000 compressed bit-stream preserving bit-depth information (SO, MN, KY, HN), pp. 1–4.
ICPR-2008-XuanSCTTL #image- Reversible binary image data hiding by run-length histogram modification (GX, YQS, PC, XT, JT, JL), pp. 1–4.
LICS-2008-Pottier #anti #higher-order- Hiding Local State in Direct Style: A Higher-Order Anti-Frame Rule (FP), pp. 331–340.
ASE-2007-Song #adaptation #composition- Adaptation hiding modularity (YS), pp. 551–554.
SIGMOD-2007-NergizAC #database- Hiding the presence of individuals from shared databases (MEN, MA, CC), pp. 665–676.
VLDB-2007-SalperwyckABBPS #named- GhostDB: Hiding Data from Prying Eyes (CS, NA, MB, LB, PP, DS), pp. 1346–1349.
STOC-2007-HaitnerR #statistics- Statistically-hiding commitment from any one-way function (IH, OR), pp. 1–10.
ICSE-2007-LeavensM #information management #interface #specification- Information Hiding and Visibility in Interface Specifications (GTL, PM), pp. 385–395.
CGO-2007-MoseleySRGP #parallel #profiling- Shadow Profiling: Hiding Instrumentation Costs with Parallelism (TM, AS, VJR, DG, RP), pp. 198–208.
PPoPP-2007-GuoDLLC #latency #multi #network #thread- Latency hiding through multithreading on a network processor (XG, JD, LL, ZL, PRC), pp. 130–131.
VMCAI-2007-BallK #approximate #source code- Better Under-Approximation of Programs by Hiding Variables (TB, OK), pp. 314–328.
CIKM-2006-Gkoulalas-DivanisV #approach #integer #programming- An integer programming approach for frequent itemset hiding (AGD, VSV), pp. 748–757.
ICPR-v4-2006-QuanZ #using- Data Hiding in MPEG Compressed Audio Using Wet Paper Codes (XQ, HZ), pp. 727–730.
SAC-2006-BodhuinCPT #complexity #physics- Hiding complexity and heterogeneity of the physical world in smart living environments (TB, GC, RP, MT), pp. 1921–1927.
DATE-2005-FaroukS #algorithm #communication #encryption #hybrid #implementation #security- An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security (HAF, MS), pp. 76–81.
ESEC-FSE-2005-SullivanGSCSTR #aspect-oriented #design #information management #interface- Information hiding interfaces for aspect-oriented design (KJS, WGG, YS, YC, MS, NT, HR), pp. 166–175.
CHI-2004-BaudischPB #usability #user interface- Flat volume control: improving usability by hiding the volume control hierarchy in the user interface (PB, JP, SB), pp. 255–262.
CSCW-2004-GolderD #game studies #online- Hiding and revealing in online poker games (SAG, JSD), pp. 370–373.
CSCW-2004-SchankH #collaboration #modelling #uml- Collaborative modeling: hiding UML and promoting data examples in NEMo (PKS, LH), pp. 574–577.
ICPR-v4-2004-LiuC #adaptation #image- An Adaptive Data Hiding Technique for Binary Images (THL, LWC), pp. 831–834.
ICPR-v4-2004-PeiZ #image #multi- Hiding Multiple Data in Color Images by Histogram Modification (SCP, YCZ), pp. 799–802.
ICPR-v4-2004-YuWT04a #image- Steganalysis of Data Hiding in Binary Images (XY, YW, TT), pp. 877–880.
POPL-2004-OHearnYR #information management- Separation and information hiding (PWO, HY, JCR), pp. 268–280.
ASPLOS-2004-ZhuangZP #framework #information management #named- HIDE: an infrastructure for efficiently protecting information leakage on the address bus (XZ, TZ, SP), pp. 72–84.
KDD-2003-Jermaine #correlation #game studies- Playing hide-and-seek with correlations (CJ), pp. 559–564.
CGO-2003-ZhangG #security #slicing- Hiding Program Slices for Software Security (XZ, RG), pp. 325–336.
ICPR-v3-2002-JainUH #image- Hiding a Face in a Fingerprint Image (AKJ, UU, RLH), pp. 756–759.
FASE-2001-MossakowskiAH #development #graph- Extending Development Graphs with Hiding (TM, SA, DH), pp. 269–283.
DAC-2000-WangKS #clustering #latency #memory management #scheduling- Optimal two level partitioning and loop scheduling for hiding memory latency for DSP applications (ZW, MK, EHMS), pp. 540–545.
CSMR-2000-BrilFGKW #algebra #multi #using- Hiding Expressed Using Relation Algebra with Multi-Relations — Oblique Lifting and Lowering for Unbalanced Systems (RJB, LMGF, AG, RLK, TW), pp. 33–44.
FM-v2-1999-GoguenR #algebra- Hiding More of Hidden Algebra (JAG, GR), pp. 1704–1719.
SIGMOD-1996-MogiK #case study- Hot Mirroring: A Study to Hide Parity Upgrade Penalty and Degradations During Rebuilds for RAID5 (KM, MK), pp. 183–194.
STOC-1996-AndrewsLMZ #automation #latency #network- Automatic Methods for Hiding Latency in High Bandwidth Networks (Extended Abstract) (MA, FTL, PTM, LZ), pp. 257–265.
ASPLOS-1996-BianchiniKPMAA #communication #latency- Hiding Communication Latency and Coherence Overhead in Software DSMs (RB, LIK, RP, MDM, MA, CLdA), pp. 198–209.
OOPSLA-1994-LortzS #contract #programming- Combining Contracts and Exemplar-Based Programming for Class Hiding and Customization (VBL, KGS), pp. 453–467.
ICSE-1991-Banatre #distributed- Hiding Distribution in Distributed Systems (MB), pp. 189–196.
STOC-1990-FeigeS #protocol- Witness Indistinguishable and Witness Hiding Protocols (UF, AS), pp. 416–426.
STOC-1987-AbadiFK #on the- On Hiding Information from an Oracle (Extended Abstract) (MA, JF, JK), pp. 195–203.
DAC-1975-ThompsonB75a #implementation #logic #multi #re-engineering #simulation- The software engineering technique of data hiding as applied to multi-level model implementation of logical devices in digital simulation (EWT, NB), pp. 195–201.