Sciweavers

371 search results - page 45 / 75
» Adaptation hiding modularity
Sort
View
ACCV
2007
Springer
15 years 3 months ago
High Capacity Watermarking in Nonedge Texture Under Statistical Distortion Constraint
High-capacity image watermarking scheme aims at maximize bit rate of hiding information, neither eliciting perceptible image distortion nor facilitating special watermark attack. T...
Fan Zhang, Wenyu Liu, Chunxiao Liu
GPCE
2007
Springer
15 years 3 months ago
Debugging macros
Over the past two decades, Scheme macros have evolved into a powerful API for the compiler front-end. Like Lisp macros, their predecessors, Scheme macros expand source programs in...
Ryan Culpepper, Matthias Felleisen
84
Voted
ICCS
2007
Springer
15 years 3 months ago
Securely Deliver Data by Multi-path Routing Scheme in Wireless Mesh Networks
Wireless Mesh Networks with static Transit Access Points (TAPs) have many advantages to connect different kinds of networks. While Mobile Ad hoc Networks still have many challenges...
Cao Trong Hieu, Choong Seon Hong
SYNASC
2005
IEEE
98views Algorithms» more  SYNASC 2005»
15 years 3 months ago
Archeology of Code Duplication: Recovering Duplication Chains from Small Duplication Fragments
Code duplication is a common problem, and a wellknown sign of bad design. As a result of that, in the last decade, the issue of detecting code duplication led to various solutions...
Richard Wettel, Radu Marinescu
MIDDLEWARE
2005
Springer
15 years 3 months ago
Integrated support for handoff management and context awareness in heterogeneous wireless networks
The overwhelming success of mobile devices and wireless communications is stressing the need for the development of mobility-aware services. Device mobility requires services adap...
Paolo Bellavista, Marcello Cinque, Domenico Cotron...