Sciweavers

5577 search results - page 153 / 1116
» E2K Technology and Implementation
Sort
View
HIS
2009
14 years 9 months ago
An Efficient VQ-Based Data Hiding Scheme Using Voronoi Clustering
In this paper, we propose a vector quantization (VQ) -based information hiding scheme that cluster the VQ codeowrds according the codewords' relation on Voronoi Diagram (VD). ...
Ming-Ni Wu, Puu-An Juang, Yu-Chiang Li
HVEI
2009
14 years 9 months ago
Measuring perceptual contrast in a multi-level framework
In this paper, we propose and discuss some approaches for measuring perceptual contrast in digital images. We start from previous algorithms by implementing different local measur...
Gabriele Simone, Marius Pedersen, Jon Yngve Hardeb...
IADIS
2009
14 years 9 months ago
Rendezvous-based associations: Language abstractions for robot collaboration
IONS FOR ROBOT COLLABORATION Bent Bruun Kristensen Maersk Mc-Kinney Moller Institute, University of Southern Denmark Campusvej 55, DK-5230, Odense M, Denmark Collaboration between...
Bent Bruun Kristensen
IADIS
2009
14 years 9 months ago
Diabetes patients' care based on mobile monitoring
In this paper, we propose a new architecture for diabetes patients. These applications allow the monitoring, patient selfcontrol and communication between patient and doctor. More...
Vladimir Villarreal, José Bravo, Ramó...
ICISS
2009
Springer
14 years 9 months ago
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations
We propose a novel approach for granting partial access on arbitrary objects at the granularity of methods to remote clients. The applications that we target use Remote Method Invo...
Jeff Zarnett, Patrick Lam, Mahesh V. Tripunitara