Sciweavers

188 search results - page 25 / 38
» Injectivity analysis using interval analysis: Application to...
Sort
View
82
Voted
SSWMC
2004
15 years 1 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
98
Voted
ICSM
2006
IEEE
15 years 6 months ago
Working Session: Information Retrieval Based Approaches in Software Evolution
During software evolution a collection of related artifacts with different representations are created. Some of these are composed of structured data (e.g., analysis data), some c...
Andrian Marcus, Andrea De Lucia, Jane Huffman Haye...
124
Voted
LWA
2004
15 years 1 months ago
VISION - a Semantic Web Portal for Describing the State-of-the-art on European Knowledge Management
For the realization of this strategic roadmap project a scenario-driven approach has been used, i.e. several scenarios for possible future applications concerning KM have been deve...
Mark Hefke
99
Voted
ECIS
2004
15 years 1 months ago
The challenge of translating health information systems from one developing country context to another: case study from Mozambiq
What does it take for an open source, Not-for-Profit, software developed in one context to be internationalized and localized so as to be used in another context different from it...
José Leopoldo Nhampossa
DASFAA
2010
IEEE
225views Database» more  DASFAA 2010»
15 years 20 days ago
Mining Regular Patterns in Data Streams
Discovering interesting patterns from high-speed data streams is a challenging problem in data mining. Recently, the support metric-based frequent pattern mining from data stream h...
Syed Khairuzzaman Tanbeer, Chowdhury Farhan Ahmed,...