Sciweavers

2388 search results - page 111 / 478
» Kernel information embeddings
Sort
View
ICIP
2002
IEEE
16 years 6 months ago
Multimedia content authentication: fundamental limits
In many multimedia applications, there is a need to authenticate a source that has been subjected to benign degradations in addition to potential tampering attacks. We develop a m...
Emin Martinian, Gregory W. Wornell
CIKM
2008
Springer
15 years 6 months ago
A SQL database system for solving constraints
This demonstration presents the concepts, design, and implementation of SCDE, a relational database systems extended with the ability to solve constraint satisfaction problems (CS...
Sebastien Siva, Lesi Wang
ROBOCOMM
2007
IEEE
15 years 11 months ago
Cooperative information fusion in a network robot system
—The vision of network robot systems involves robots embedded in smart environments, with which they can collaborate and communicate. In such systems, robots have access to many ...
Kevin LeBlanc, Alessandro Saffiotti
OOIS
2001
Springer
15 years 9 months ago
From Use Cases to Objects: An Industrial Information Systems Case Study Analysis
Identifying the objects that constitute a software system is a critical task for any object-oriented system development and several techniques have already been introduced to tack...
João M. Fernandes, Ricardo Jorge Machado
IAJIT
2010
85views more  IAJIT 2010»
15 years 3 months ago
Hiding Text Information in a Digital Image Based on Entropy Function
: The paper is concerned with hiding information into a digital image, specifically, an English text is used to be hidden into a digital grey-scale image. The purpose of this resea...
Nasser Hamad