66 papers:
- DocEng-2015-WalgerH #multi
- Hiding Information in Multiple Level-line Moirés (TW, RDH), pp. 21–24.
- CHI-2015-ReevesGFBART
- I’d Hide You: Performing Live Broadcasting in Public (SR, CG, MF, SB, MA, JRF, NT), pp. 2573–2582.
- ITiCSE-2014-Katai #algorithm #visualisation
- Selective hiding for improved algorithmic visualization (ZK), pp. 33–38.
- CHI-2014-TewariC #game studies #what
- What did spot hide?: a question-answering game for preschool children (AT, JC), pp. 1807–1816.
- SAC-2014-PetroccoCPE #performance
- Hiding user content interest while preserving P2P performance (RP, MC, JAP, DHJE), pp. 501–508.
- SAC-2014-SwamyIG #2d #image
- Two level reversible data hiding in 2D images (NRS, SI, PG), pp. 58–59.
- CHI-2013-HuangF #crowdsourcing #exclamation #social
- Don’t hide in the crowd!: increasing social transparency between peer workers improves crowdsourcing outcomes (SWH, WTF), pp. 621–630.
- DAC-2012-KimYL #latency #performance #ram
- Write performance improvement by hiding R drift latency in phase-change RAM (YK, SY, SL), pp. 897–906.
- LICS-2012-McIverMM #information management #nondeterminism #probability
- A Kantorovich-Monadic Powerdomain for Information Hiding, with Probability and Nondeterminism (AM, LM, CM), pp. 461–470.
- KDD-2011-Gkoulalas-DivanisL
- Revisiting sequential pattern hiding to enhance utility (AGD, GL), pp. 1316–1324.
- ECOOP-2011-OstermannGKR #composition #information management
- Revisiting Information Hiding: Reflections on Classical and Nonclassical Modularity (KO, PGG, CK, TR), pp. 155–178.
- ESOP-2010-NaumannB #bound #first-order #higher-order #information management
- Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions (DAN, AB), pp. 2–22.
- TACAS-2010-AndresPRS #information management
- Computing the Leakage of Information-Hiding Systems (MEA, CP, PvR, GS), pp. 373–389.
- ICPR-2010-GuoZ #authentication #capacity #image
- High Capacity Data Hiding for Binary Image Authentication (MG, HZ), pp. 1441–1444.
- KDIR-2010-GokceA #algorithm #trade-off
- A Tradeoff Balancing Algorithm for Hiding Sensitive Frequent Itemsets (HG, OA), pp. 200–205.
- SAC-2010-DelisVT #approach #classification
- A data perturbation approach to sensitive classification rule hiding (AD, VSV, AAT), pp. 605–609.
- SAC-2010-WangLRKL #distributed #information management
- Improving complex distributed software system availability through information hiding (LW, YL, SR, KAK, XL), pp. 452–456.
- HPCA-2010-BiDG #energy
- Delay-Hiding energy management mechanisms for DRAM (MB, RD, CG), pp. 1–10.
- DAC-2009-GuQZ #design #information management
- Information hiding for trusted system design (JG, GQ, QZ), pp. 698–701.
- FM-2009-ReevesS #fault #robust #semantics
- A Robust Semantics Hides Fewer Errors (SR, DS), pp. 499–515.
- ASPLOS-2009-ParkLZ #debugging #named
- CTrigger: exposing atomicity violation bugs from their hiding places (SP, SL, YZ), pp. 25–36.
- CC-2009-CampanoniSAC #compilation #jit #manycore
- Dynamic Look Ahead Compilation: A Technique to Hide JIT Compilation Latencies in Multicore Environment (SC, MS, GA, SCR), pp. 220–235.
- DATE-2008-ParkSP #embedded #execution #using
- Hiding Cache Miss Penalty Using Priority-based Execution for Embedded Processors (SP, AS, YP), pp. 1190–1195.
- FoSSaCS-2008-BraunCP #composition #information management
- Compositional Methods for Information-Hiding (CB, KC, CP), pp. 443–457.
- SAS-2008-PredaGV
- Hiding Software Watermarks in Loop Structures (MDP, RG, EV), pp. 174–188.
- ICALP-C-2008-JareckiL #authentication #multi #performance
- Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials (SJ, XL), pp. 715–726.
- SEFM-2008-Giacobazzi08a #obfuscation
- Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and Watermarking (RG), pp. 7–18.
- ICPR-2008-OhyamaNYN
- Reversible data hiding of full color JPEG2000 compressed bit-stream preserving bit-depth information (SO, MN, KY, HN), pp. 1–4.
- ICPR-2008-XuanSCTTL #image
- Reversible binary image data hiding by run-length histogram modification (GX, YQS, PC, XT, JT, JL), pp. 1–4.
- LICS-2008-Pottier #anti #higher-order
- Hiding Local State in Direct Style: A Higher-Order Anti-Frame Rule (FP), pp. 331–340.
- ASE-2007-Song #adaptation #composition
- Adaptation hiding modularity (YS), pp. 551–554.
- SIGMOD-2007-NergizAC #database
- Hiding the presence of individuals from shared databases (MEN, MA, CC), pp. 665–676.
- VLDB-2007-SalperwyckABBPS #named
- GhostDB: Hiding Data from Prying Eyes (CS, NA, MB, LB, PP, DS), pp. 1346–1349.
- STOC-2007-HaitnerR #statistics
- Statistically-hiding commitment from any one-way function (IH, OR), pp. 1–10.
- ICSE-2007-LeavensM #information management #interface #specification
- Information Hiding and Visibility in Interface Specifications (GTL, PM), pp. 385–395.
- CGO-2007-MoseleySRGP #parallel #profiling
- Shadow Profiling: Hiding Instrumentation Costs with Parallelism (TM, AS, VJR, DG, RP), pp. 198–208.
- PPoPP-2007-GuoDLLC #latency #multi #network #thread
- Latency hiding through multithreading on a network processor (XG, JD, LL, ZL, PRC), pp. 130–131.
- VMCAI-2007-BallK #approximate #source code
- Better Under-Approximation of Programs by Hiding Variables (TB, OK), pp. 314–328.
- CIKM-2006-Gkoulalas-DivanisV #approach #integer #programming
- An integer programming approach for frequent itemset hiding (AGD, VSV), pp. 748–757.
- ICPR-v4-2006-QuanZ #using
- Data Hiding in MPEG Compressed Audio Using Wet Paper Codes (XQ, HZ), pp. 727–730.
- SAC-2006-BodhuinCPT #complexity #physics
- Hiding complexity and heterogeneity of the physical world in smart living environments (TB, GC, RP, MT), pp. 1921–1927.
- DATE-2005-FaroukS #algorithm #communication #encryption #hybrid #implementation #security
- An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security (HAF, MS), pp. 76–81.
- ESEC-FSE-2005-SullivanGSCSTR #aspect-oriented #design #information management #interface
- Information hiding interfaces for aspect-oriented design (KJS, WGG, YS, YC, MS, NT, HR), pp. 166–175.
- CHI-2004-BaudischPB #usability #user interface
- Flat volume control: improving usability by hiding the volume control hierarchy in the user interface (PB, JP, SB), pp. 255–262.
- CSCW-2004-GolderD #game studies #online
- Hiding and revealing in online poker games (SAG, JSD), pp. 370–373.
- CSCW-2004-SchankH #collaboration #modelling #uml
- Collaborative modeling: hiding UML and promoting data examples in NEMo (PKS, LH), pp. 574–577.
- ICPR-v4-2004-LiuC #adaptation #image
- An Adaptive Data Hiding Technique for Binary Images (THL, LWC), pp. 831–834.
- ICPR-v4-2004-PeiZ #image #multi
- Hiding Multiple Data in Color Images by Histogram Modification (SCP, YCZ), pp. 799–802.
- ICPR-v4-2004-YuWT04a #image
- Steganalysis of Data Hiding in Binary Images (XY, YW, TT), pp. 877–880.
- POPL-2004-OHearnYR #information management
- Separation and information hiding (PWO, HY, JCR), pp. 268–280.
- ASPLOS-2004-ZhuangZP #framework #information management #named
- HIDE: an infrastructure for efficiently protecting information leakage on the address bus (XZ, TZ, SP), pp. 72–84.
- KDD-2003-Jermaine #correlation #game studies
- Playing hide-and-seek with correlations (CJ), pp. 559–564.
- CGO-2003-ZhangG #security #slicing
- Hiding Program Slices for Software Security (XZ, RG), pp. 325–336.
- ICPR-v3-2002-JainUH #image
- Hiding a Face in a Fingerprint Image (AKJ, UU, RLH), pp. 756–759.
- FASE-2001-MossakowskiAH #development #graph
- Extending Development Graphs with Hiding (TM, SA, DH), pp. 269–283.
- DAC-2000-WangKS #clustering #latency #memory management #scheduling
- Optimal two level partitioning and loop scheduling for hiding memory latency for DSP applications (ZW, MK, EHMS), pp. 540–545.
- CSMR-2000-BrilFGKW #algebra #multi #using
- Hiding Expressed Using Relation Algebra with Multi-Relations — Oblique Lifting and Lowering for Unbalanced Systems (RJB, LMGF, AG, RLK, TW), pp. 33–44.
- FM-v2-1999-GoguenR #algebra
- Hiding More of Hidden Algebra (JAG, GR), pp. 1704–1719.
- SIGMOD-1996-MogiK #case study
- Hot Mirroring: A Study to Hide Parity Upgrade Penalty and Degradations During Rebuilds for RAID5 (KM, MK), pp. 183–194.
- STOC-1996-AndrewsLMZ #automation #latency #network
- Automatic Methods for Hiding Latency in High Bandwidth Networks (Extended Abstract) (MA, FTL, PTM, LZ), pp. 257–265.
- ASPLOS-1996-BianchiniKPMAA #communication #latency
- Hiding Communication Latency and Coherence Overhead in Software DSMs (RB, LIK, RP, MDM, MA, CLdA), pp. 198–209.
- OOPSLA-1994-LortzS #contract #programming
- Combining Contracts and Exemplar-Based Programming for Class Hiding and Customization (VBL, KGS), pp. 453–467.
- ICSE-1991-Banatre #distributed
- Hiding Distribution in Distributed Systems (MB), pp. 189–196.
- STOC-1990-FeigeS #protocol
- Witness Indistinguishable and Witness Hiding Protocols (UF, AS), pp. 416–426.
- STOC-1987-AbadiFK #on the
- On Hiding Information from an Oracle (Extended Abstract) (MA, JF, JK), pp. 195–203.
- DAC-1975-ThompsonB75a #implementation #logic #multi #re-engineering #simulation
- The software engineering technique of data hiding as applied to multi-level model implementation of logical devices in digital simulation (EWT, NB), pp. 195–201.