Sciweavers

2340 search results - page 41 / 468
» Data abstraction and information hiding
Sort
View
ICSOFT
2007
13 years 11 months ago
Interoperating Context Discovery Mechanisms
Context-Aware applications adapt their behaviour to the current situation of the user. This information, for instance user location and user availability, is called context informa...
Tom Broens, Remco Poortinga, Jasper Aarts
CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 6 months ago
Rules of Thumb for Information Acquisition from Large and Redundant Data
We develop an abstract model of information acquisition from redundant data. We assume a random sampling process from data which contain information with bias and are interested in...
Wolfgang Gatterbauer
JDCTA
2008
535views more  JDCTA 2008»
13 years 10 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
NAACL
2010
13 years 7 months ago
Linguistic Steganography Using Automatically Generated Paraphrases
This paper describes a method for checking the acceptability of paraphrases in context. We use the Google n-gram data and a CCG parser to certify the paraphrasing grammaticality a...
Ching-Yun Chang, Stephen Clark
DCOSS
2005
Springer
14 years 3 months ago
Routing Explicit Side Information for Data Compression in Wireless Sensor Networks
Abstract. Two difficulties in designing data-centric routes [2–5] in wireless sensor networks are the lack of reasonably practical data aggregation models and the high computatio...
Huiyu Luo, Gregory J. Pottie