Inicio Nosotros Búsquedas
Buscar en nuestra Base de Datos:     
Autor: Mercuri, Rebecca T. (Comienzo)
2 registros cumplieron la condición especificada en la base de información BIBCYT. ()
Registro 1 de 2, Base de información BIBCYT
Publicación seriada
Referencias AnalíticasReferencias Analíticas
Autor: Mercuri, Rebecca T. mercuri@acm.org
Oprima aquí para enviar un correo electrónico a esta dirección
Título: The Code of Elections
Páginas/Colación: pp. 52-57; 28 cm; il
Communications of the ACM Vol. 47, no. 10 October 2004
Información de existenciaInformación de existencia

Resumen
This article focuses on the code of election law. Elections are governed by intricate and voluminous codes of law that, in turn, are transformed into the program code that governs the functionality of computer systems used in election processes. Voting systems reflect the interaction of technology and governance as grounded in the history of democracy in the locality in which they reside. Variances of election law are therefore as great as the differences in history of democratic nations and states. Voting technology is diffused in a context where the governmental parties in a democracy may have strong and vested interests in the reliability of the technology, or alternatively may wish to ensure that the technology can be allowed to be subverted to favor certain groups or individuals. In computerized voting, decisions intended to assist the voter can remove critical choices. Overvoting and undervoting are examples of actions, generally viewed as undesirable, that can be effectively prohibited or reduced by election system designs

Registro 2 de 2, Base de información BIBCYT
Publicación seriada
Referencias AnalíticasReferencias Analíticas
Autor: Mercuri, Rebecca T. mercuri@acm.org
Oprima aquí para enviar un correo electrónico a esta dirección
Título: The Many Colors of Multimedia Security.
Páginas/Colación: pp. 25-29.; 28cm.; il.
Communications of the ACM Vol. 47, no. 12 December 2004
Información de existenciaInformación de existencia

Resumen
This article reports that digital multimedia is exposed to a broad spectrum of security problems. From the standpoint of the media provider, protection of materials from unauthorized distribution or modification is a primary concern. At the delivery end, recipients want to ensure that downloads are virus-free and legitimately obtained. Ironically, encryption and digital branding tools can be employed both for securing multimedia as well as for circumventing laws pertaining to content and use. The most popular of these techniques are steganography and watermarking or the addition of an unremovable identifier to tag the content, indicating ownership. One popular method used for data encoding in digital audio files is Least Significant Bit, where the low bit of each sound sample is successively replaced by digits from a binary string. Another is phase coding, where the phase of an audio signal is replaced by a reference phase used to modulate a data signal. Echoes can even be altered in order to conceal information. All these techniques rely on the fact that the perception of sound is rather inaccurate.

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

UCLA - Biblioteca de Ciencias y Tecnologia Felix Morales Bueno

Generados por el servidor 'bibcyt.ucla.edu.ve' (18.191.206.196)
Adaptive Server Anywhere (07.00.0000)
ODBC
Sesión="" Sesión anterior=""
ejecutando Back-end Alejandría BE 7.0.7b0 ** * *
18.191.206.196 (NTM) bajo el ambiente Apache/2.2.4 (Win32) PHP/5.2.2.
usando una conexión ODBC (RowCount) al manejador de bases de datos..
Versión de la base de información BIBCYT: 7.0.0 (con listas invertidas [2.0])

Cliente: 18.191.206.196
Salida con Javascript


** Back-end Alejandría BE 7.0.7b0 *