Sciweavers

6031 search results - page 914 / 1207
» Communicating Transaction Processes
Sort
View
MTA
2006
283views more  MTA 2006»
15 years 4 months ago
An evaluation of image based steganography methods
- Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyo...
Karen Bailey, Kevin Curran
CCR
2004
86views more  CCR 2004»
15 years 4 months ago
IPv4 address allocation and the BGP routing table evolution
The IP address consumption and the global routing table size are two of the vital parameters of the Internet growth. In this paper we quantitatively characterize the IPv4 address ...
Xiaoqiao Meng, Zhiguo Xu, Beichuan Zhang, Geoff Hu...
CIE
2004
Springer
15 years 4 months ago
Automating Lighting Design for Interactive Entertainment
Recent advances in computer graphics, particularly in real-time rendering, have caused major improvements in 3D graphics and rendering techniques used in interactive entertainment...
Magy Seif El-Nasr, Ian Horswill
CAD
2000
Springer
15 years 4 months ago
The Enterprise-Web portal for life-cycle support
As we enter the new millennium, the approach to product development is evolving rapidly. Companies are in the process of creating a distributed design and manufacturing environmen...
Mohsen Rezayat
CN
2002
89views more  CN 2002»
15 years 4 months ago
Measurement-based replanning of cell capacities in GSM networks
Due to the scarcity of the spectral resources and mobility of the portables, the call attempts may be blocked during call initiation or terminated during the hand-off process. Whe...
Ertan Onur, Hakan Deliç, Cem Ersoy, M. Ufuk...