Sciweavers

3082 search results - page 157 / 617
» its 2004
Sort
View
106
Voted
SSWMC
2004
15 years 2 months ago
Universal image steganalysis using rate-distortion curves
The goal of image steganography is to embed information in a cover image using modifications that are undetectable. In actual practice, however, most techniques produce stego imag...
Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp
100
Voted
TELECARE
2004
160views Healthcare» more  TELECARE 2004»
15 years 2 months ago
Aingeru: an Innovating System for Tele Assistance of Elderly People
In this article we present the main features of Aingeru, a system that provides a new kind of tele assistance service. The purpose of developing Aingeru has been to overcome the ma...
Alberto Tablado, Arantza Illarramendi, Miren I. Ba...
144
Voted
WIS
2004
15 years 2 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
104
Voted
WIS
2004
15 years 2 months ago
A Wireless Data Stream Mining Model
The sensor networks, web click stream and astronomical applications generate a continuous flow of data streams. Most likely data streams are generated in a wireless environment. Th...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...
141
Voted
WOA
2004
15 years 2 months ago
A Game-Theoretic Operational Semantics
Abstract-- In this paper we present the communication architecture of the DALI Logic Programming Agent-Oriented language and we discuss its semantics. We have designed a meta-level...
Arianna Tocchio, Stefania Costantini, Alessia Vert...