Sciweavers

18374 search results - page 3661 / 3675
» Applications for data hiding
Sort
View
EJWCN
2010
162views more  EJWCN 2010»
13 years 2 months ago
OMNeT++-Based Cross-Layer Simulator for Content Transmission over Wireless Ad Hoc Networks
Flexbility and deployment simplicity are among the numerous advantages of wireless links when compared to standard wired communications. However, challenges do remain high for wire...
Raphaël Massin, Catherine Lamy-Bergot, Christ...
GIS
2010
ACM
13 years 2 months ago
Modelling spatial video as part of a GIS video analysis framework
It is now common for video; real-time and collected, mobile and static, to be georeferenced and stored in large archives for users of expert systems to access and interact with. I...
Paul Lewis
IFIP
2010
Springer
13 years 2 months ago
Bounded Memory Dolev-Yao Adversaries in Collaborative Systems
Abstract. This paper extends existing models for collaborative systems. We investigate how much damage can be done by insiders alone, without collusion with an outside adversary. I...
Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, ...
IHI
2010
186views Healthcare» more  IHI 2010»
13 years 2 months ago
Analysis of an online health social network
With the continued advances of Web 2.0, health-centered Online Social Networks (OSNs) are emerging to provide knowledge and support for those interested in managing their own heal...
Xiaoxiao Ma, Guanling Chen, Juntao Xiao
JIPS
2010
138views more  JIPS 2010»
13 years 2 months ago
A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking Sy
In order to provide a tailored education for learners within the ubiquitous environment, it is critical to undertake an analysis of the learning activities of learners. For this pu...
Hyung-Min Lim, Kun-Won Jang, Byung-Gi Kim
« Prev « First page 3661 / 3675 Last » Next »