Sciweavers

1039 search results - page 170 / 208
» The Def-inite Approach to Dependency Analysis
Sort
View
CSREASAM
2006
15 years 1 months ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
IADIS
2003
15 years 1 months ago
Ontology Mapping for Interoperability in Semantic Web
Ontology mapping is the process whereby two ontologies are semantically related at conceptual level and the source ontology instances are transformed into target ontology entities...
Nuno Silva, João Rocha
IWFM
2000
107views Formal Methods» more  IWFM 2000»
15 years 1 months ago
A Comparison of Three Model Checkers Applied to a Distributed Database Problem
ct Increasingly, model checking is being applied to more abstract problem domains than the traditional protocol analysis. The extent to which such an approach is able to provide us...
A. J. Currie
BILDMED
2009
161views Algorithms» more  BILDMED 2009»
15 years 29 days ago
Estimation of Inner Lung Motion Fields by Non-linear Registration
Abstract. Detailed analysis of breathing dynamics, as motivated by radiotherapy of lung tumors, requires accurate estimates of inner lung motion fields. We present an evaluation an...
René Werner, Jan Ehrhardt, Alexander Schmid...
CORR
2010
Springer
143views Education» more  CORR 2010»
14 years 12 months ago
High-SIR Transmission Capacity of Wireless Networks with General Fading and Node Distribution
In many wireless systems, interference is the main performance-limiting factor, and is primarily dictated by the locations of concurrent transmitters. In many earlier works, the l...
Radha Krishna Ganti, Jeffrey G. Andrews, Martin Ha...