Sciweavers

454 search results - page 14 / 91
» Constructing customized process views
Sort
View
SIGCSE
2005
ACM
240views Education» more  SIGCSE 2005»
15 years 3 months ago
A Java framework for experimentation with steganography
This article describes a Java framework for experimentation with fundamental steganographic techniques. The framework is built on top of Java's image processing libraries and...
Kenny Hunt
ECBS
2007
IEEE
209views Hardware» more  ECBS 2007»
15 years 3 months ago
Aspect-Oriented Modeling of Ubiquitous Web Applications: The aspectWebML Approach
Ubiquitous web applications (UWA) are required to be customizable, meaning their services need to be adaptable towards the context of use, e.g., user, location, time, and device. ...
Andrea Schauerhuber, Manuel Wimmer, Wieland Schwin...
ECIS
2003
14 years 11 months ago
Using online services in untrusted environments: a privacy-preserving architecture
While online service providers are sometimes accused of forwarding identifying customer information as name and address to untrusted third parties, comparatively little attention ...
Claus Boyens, Oliver Günther
ICCS
2001
Springer
15 years 1 months ago
Reverse Pivoting in Conceptual Information Systems
Abstract. In database marketing, the behavior of customers is analyzed by studying the transactions they have performed. In order to get a global picture of the behavior of a custo...
Joachim Hereth Correia, Gerd Stumme
CVPR
2007
IEEE
15 years 11 months ago
Multiple View Image Reconstruction: A Harmonic Approach
This paper presents a new constraint connecting the signals in multiple views of a surface. The constraint arises from a harmonic analysis of the geometry of the imaging process a...
Justin Domke, Yiannis Aloimonos