acm - an acm publication

2008 - April

  • Triple layer data security

    The growth of high speed computer networks and that of Internet, in particular, has hiked the ease of Data Communication. But in the other hand this growth is also responsible for the snooping of Data at the same time. The ease, by which digital information can be duplicated and distributed, has led to the need for effective protection tools. Various encryption techniques like cryptography, digital watermarking, steganography etc have already been introduced in attempt to address these growing concerns. In this paper, an algorithmic approach is proposed in which along with the combination of cryptography and steganography (taken as security layers), an extra layer of security has been imposed in between them to obtain a completely secured data transmission scheme.

  • Employee retention: By way of management control systems
    Loyalty is passé in the modern time and professionalism is the buzzword in the contemporary corporate world. The reasons of employee attrition are also changing. Now-a-days employee leaves an organization ...
  • On degree sequence
    I ndi got her BS in Computer Science from Cal Poly and began her master's at Colorado State. She then worked as a software engineer, later managing Web applications that ...
  • Knowledge mechanics and its temporal nature
    Wordnet defines knowledge as the psychological result of perception, learning and reasoning [1]. Like mechanics is the study of the way matter and force interact with each other, knowledge mechanics ...
  • A fuzzy modeling approach to evaluate faculty performance
    Performance of a teacher is vital both for students and institution and must be measured and evaluated for positive reinforcement to teaching. This paper presents a mathematical model to evaluate ...
  • Smart phones: A tutorial
    1. INTRODUCTION Pervasive Computing integrates computation in the environment rather than computers which are distinct objects. Other terms for pervasive computing ubiquitous computing, calm technology, things that think and everyware. ...
  • The rise and fall of a good programmer
    Of all the sayings I dislike, the most vapid is one I have heard as long as I have been working with IT: We will have the paperless toilet before ...
  • Anticipating and resolving resource overloads
    The Concept of a Project Resource In the context of project management, a resource is any entity that contributes to the accomplishment of project activities. Most project resources perform work ...
  • Avoiding disaster when your hard drive fails
    No one really expects a disk crash, but they do happen, usually at the most unconvenient times. Having a quick and easy-to-restore backup can eliminate both the distress and expense ...
  • An Interview with Vaughan Merlyn on Management
    Vaughan Merlyn, who is a management consultant, researcher, and author, has had as his primary focus for more than three decades now has been the use of information and information ...