Sciweavers

1914 search results - page 269 / 383
» Web Data Management Practices - Emerging Techniques and Tech...
Sort
View
IH
1998
Springer
15 years 2 months ago
An Information-Theoretic Model for Steganography
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modi e...
Christian Cachin
W4A
2009
ACM
15 years 4 months ago
Accessibility perspectives on enabling South African sign language in the South African national accessibility portal
Persons with disabilities are often marginalised from economy and society due to the lack of access to disability related information and services. Through the use of assistive te...
Louis Coetzee, Guillaume J.-L. Olivrin, Ilse Vivie...
HICSS
1999
IEEE
115views Biometrics» more  HICSS 1999»
15 years 2 months ago
Focusing on Mobility
In this paper, we motivate the importance of the field of mobile computing and survey current practical and formal approaches. We argue that the existing formalisms are not suffic...
Klaus Bergner, Radu Grosu, Andreas Rausch, Alexand...
IC
2003
14 years 11 months ago
Remote Real Laboratory: Linux Installation and Configuration
: Remote real laboratories deal with performing real lab experiments remotely via Internet. Recent advances in Internet/web technologies and computer-controlled instrumentation all...
Alassane Diop, Amine Berqia, Jürgen Harms
CIKM
2005
Springer
15 years 3 months ago
Compact reachability labeling for graph-structured data
Testing reachability between nodes in a graph is a well-known problem with many important applications, including knowledge representation, program analysis, and more recently, bi...
Hao He, Haixun Wang, Jun Yang 0001, Philip S. Yu