Sciweavers

1228 search results - page 45 / 246
» Copyright
Sort
View
IDMS
1997
Springer
153views Multimedia» more  IDMS 1997»
14 years 1 months ago
Embedding Data in 3D Models
The recent popularity of digital media such as CD-ROM and the Internet has prompted exploration of techniques for embedding data, either visibly or invisibly, into text, image, and...
Ryutarou Ohbuchi, Hiroshi Masuda, Masaki Aono
AHS
2006
IEEE
188views Hardware» more  AHS 2006»
14 years 1 months ago
Finite State Machine IP Watermarking: A Tutorial
Sharing Intellectual Property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
AICCSA
2001
IEEE
200views Hardware» more  AICCSA 2001»
14 years 1 months ago
Location Management in Mobile Computing
This paper presents a novel approach based on clustering algorithms in combination with the location area (LA) scheme to solve the mobility management problem. Users' movemen...
Riky Subrata, Albert Y. Zomaya
ISW
2000
Springer
14 years 1 months ago
Towards a Practical Secure Framework for Mobile Code Commerce
Securing the mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must ...
Gaël Hachez, Laurent Den Hollander, Mehrdad J...
RSCTC
2000
Springer
122views Fuzzy Logic» more  RSCTC 2000»
14 years 1 months ago
Computer Vision Using Fuzzy Logic for Robot Manipulator
: This paper presents a Lab. implementation of a computer vision using fuzzy models for pattern recognition for the detection of boundaries in images obtained through a camera inst...
Adriano Breunig, Haroldo R. de Azevedo, Edilberto ...