The recent popularity of digital media such as CD-ROM and the Internet has prompted exploration of techniques for embedding data, either visibly or invisibly, into text, image, and...
Sharing Intellectual Property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach...
This paper presents a novel approach based on clustering algorithms in combination with the location area (LA) scheme to solve the mobility management problem. Users' movemen...
Securing the mobile code commerce is not an easy task at all. We propose in this paper a framework to tackle this problem. In a first step, we analyse the general issues that must ...
: This paper presents a Lab. implementation of a computer vision using fuzzy models for pattern recognition for the detection of boundaries in images obtained through a camera inst...
Adriano Breunig, Haroldo R. de Azevedo, Edilberto ...