Sciweavers

353 search results - page 18 / 71
» The C Hackers Guide
Sort
View
IWDW
2005
Springer
15 years 3 months ago
On the Achievable Rate of Side Informed Embedding Techniques with Steganographic Constraints
The development of watermarking schemes in the literature is generally guided by a power constraint on the watermark to be embedded into the host. In a steganographic framework the...
Mark T. Hogan, Félix Balado, Neil J. Hurley...
GCSE
2001
Springer
15 years 2 months ago
Scenario-Based Generation and Evaluation of Software Architectures
Architecture conception is a difficult and time consuming process, requiring advanced skills from the software architect. The tasks of an architect are alleviated if means can be p...
Hans de Bruijn, Johannes C. van Vliet
EUROMICRO
1999
IEEE
15 years 1 months ago
The Komodo Project: Thread-based Event Handling Supported by a Multithreaded Java Microcontroller
The Komodo project concerns the handling of multiple real-time events by Java threads that are supported by a multithreaded Java microcontroller. The architecture of the processor...
Jochen Kreuzinger, R. Marston, Theo Ungerer, Uwe B...
ICIP
2007
IEEE
14 years 11 months ago
Bayesian Example Based Segmentation using a Hybrid Energy Model
This paper describes a supervised segmentation algorithm which draws inspiration from recent advances in non-parametric texture synthesis. A set of example images which have been ...
Claire Gallagher, Anil C. Kokaram
IJCAI
2003
14 years 11 months ago
Integrity and Change in Modular Ontologies
The benefits of modular representations arc well known from many areas of computer science. In this paper, we concentrate on the benefits of modular ontologies with respect to loc...
Heiner Stuckenschmidt, Michel C. A. Klein