Sciweavers

112 search results - page 8 / 23
» Being in the Right Place at the Right Time
Sort
View
MTA
2006
283views more  MTA 2006»
14 years 9 months ago
An evaluation of image based steganography methods
- Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyo...
Karen Bailey, Kevin Curran
AUTOMATICA
2005
103views more  AUTOMATICA 2005»
14 years 9 months ago
Incorporating state estimation into model predictive control and its application to network traffic control
Model predictive control (MPC) is of interest because it is one of the few control design methods which preserves standard design variables and yet handles constraints. MPC is nor...
Jun Yan, Robert R. Bitmead
CG
2002
Springer
14 years 9 months ago
Visualizing scalar volumetric data with uncertainty
Increasingly, more importance is placed on the uncertainty information of data being displayed. This paper focuses on techniques for visualizing 3D scalar data sets with correspon...
Suzana Djurcilov, Kwansik Kim, Pierre Lermusiaux, ...
MCAM
2007
Springer
115views Multimedia» more  MCAM 2007»
15 years 3 months ago
Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring
By reviewing DRMs up to now and two typical examples – AVS DRM and DMP IDP, the paper tries to find out the fundamental challenge of content protection approach from technical an...
Tiejun Huang

Book
316views
16 years 5 months ago
Aspects of AJAX
"This book is about an AJAX Framework and an AJAX Engine for JavaScript, XML, SOAP, WSDL und ASP.NET using standard Web Services on the server. The basic elements for a...
Matthias Hertel