Sciweavers

438 search results - page 42 / 88
» The forest hiding problem
Sort
View
IEEEIAS
2007
IEEE
15 years 6 months ago
Protection of Mammograms Using Blind Steganography and Watermarking
As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Yue Li, Chang-Tsun Li, Chia-Hung Wei
EEMMAS
2007
Springer
15 years 6 months ago
DECIDE: Applying Multi-agent Design and Decision Logic to a Baggage Handling System
Behind the curtains at check-in desks in airports hide some of the most complex material handling systems, which manage to get your bag transported to the correct departure gate of...
Kasper Hallenborg, Yves Demazeau
TARK
2007
Springer
15 years 6 months ago
Preservation of epistemic properties in security protocol implementations
We introduce (i) a general class of security protocols with private channel as cryptographic primitive and (ii) a probabilistic epistemic logic to express properties of security pr...
Ron van der Meyden, Thomas Wilke
TABLETOP
2006
IEEE
15 years 5 months ago
Transparent Tabletop Interface for Multiple Users on Lumisight Table
This paper presents a new type of tabletop interface on Lumisight Table. Putting physical objects on a tabletop display is one of the typical methods for intuitive tangible input....
Yasuaki Kakehi, Takero Hosomi, Makoto Iida, Takesh...
AIED
2005
Springer
15 years 5 months ago
EarthTutor: A Multi-Layered Approach to ITS Authoring
This paper presents the EarthTutor authoring tool, a multi-layered system designed to remove the technical hurdles preventing teachers from having full control over the structure o...
Kristen Parton, Aaron Bell, Sowmya Ramachandran