Sciweavers

10577 search results - page 1995 / 2116
» Active Data Mining
Sort
View
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
14 years 7 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
IJACTAICIT
2010
122views more  IJACTAICIT 2010»
14 years 7 months ago
Intelligent Integrated Management for Telecommunication Networks
As the size of communication networks keeps on growing, faster connections, cooperating technologies and the divergence of equipment and data communications, the management of the...
Antonio Martín, Carlos León, F&eacut...
ICMCS
2007
IEEE
162views Multimedia» more  ICMCS 2007»
15 years 1 months ago
User-Assisted People Search in Consumer Image Collections
In this paper, we investigate the process of searching for images of specified people in the consumer family photo domain. This domain is very different from the controlled enviro...
Andrew C. Gallagher, Madirakshi Das, Alexander C. ...
ADVSE
2010
103views more  ADVSE 2010»
14 years 5 months ago
Extending Conceptual Schemas with Business Process Information
Abstract. The specification of business processes is becoming a more and more critical aspect for organizations. Such processes are specified as workflow models expressing the logi...
Marco Brambilla, Jordi Cabot, Sara Comai
AUGHUMAN
2011
14 years 5 months ago
Full body interaction for serious games in motor rehabilitation
Serious games and especially their use in healthcare applications are an active and rapidly growing area of research. A key aspect of games in rehabilitation is 3D input. In this ...
Christian Schönauer, Thomas Pintaric, Hannes ...
« Prev « First page 1995 / 2116 Last » Next »