Sciweavers

1906 search results - page 4 / 382
» Dependable Self-Hosting Distributed Systems Using Constraint...
Sort
View
ICIP
2001
IEEE
14 years 9 months ago
Hierarchical watermarking depending on local constraints
In this paper we propose a new watermarking technique where the watermark is embedded according to two keys. The first key is used to embed a code bit in a block of pixels. The se...
Christopher D. Coltman, Adrian G. Bors
HASE
1999
IEEE
13 years 11 months ago
Building Dependable Distributed Applications Using AQUA
Building dependable distributed systems using ad hoc methods is a challenging task. Without proper support, an application programmer must face the daunting requirement of having ...
Jennifer Ren, Michel Cukier, Paul Rubel, William H...
ISAS
2005
Springer
14 years 26 days ago
Dependable Distributed Computing Using Free Databases
Abstract. Designing and programming dependable distributed applications is very difficult. Databases provide features like transactions and replication that can help in the impleme...
Christof Fetzer, Trevor Jim
CSMR
2008
IEEE
13 years 9 months ago
Understanding the Impact of Distribution in Object-Oriented Distributed Systems Using Structural Program Dependencies
The software industry is increasingly facing the issues of understanding and maintaining a particular type of software systems, namely distributed systems. While these systems are...
Dan C. Cosma, Radu Marinescu
CISS
2007
IEEE
14 years 1 months ago
On Capacity of Automatic Target Recognition Systems Under the Constraint of PCA-Encoding
Limiting capabilities of practical recognition systems are determined by a variety of factors that include source encoding techniques, quality of images, complexity of underlying ...
Xiaohan Chen, Natalia A. Schmid