Sciweavers

1802 search results - page 222 / 361
» Using Declarative Specifications in Business Process Design
Sort
View
TCSV
2008
156views more  TCSV 2008»
15 years 2 months ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...
EDBTW
2010
Springer
15 years 6 months ago
The benefits of the interaction between data warehouses and question answering
Business Intelligence (BI) applications allow their users to query, understand, and analyze existing data within their organizations in order to acquire useful knowledge, thus mak...
Antonio Ferrández, Jesús Peral
SIMUTOOLS
2008
15 years 4 months ago
Transforming sources to petri nets: a way to analyze execution of parallel programs
Model checking is a suitable formal technique to analyze parallel programs' execution in an industrial context because automated tools can be designed and operated with very ...
Jean-Baptiste Voron, Fabrice Kordon
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
KDD
1995
ACM
193views Data Mining» more  KDD 1995»
15 years 6 months ago
Analyzing the Benefits of Domain Knowledge in Substructure Discovery
Discovering repetitive, interesting, and functional substructures in a structural database improves the ability to interpret and compress the data. However, scientists working wit...
Surnjani Djoko, Diane J. Cook, Lawrence B. Holder