Sciweavers

766 search results - page 116 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
IH
2007
Springer
14 years 3 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath
FGR
2000
IEEE
131views Biometrics» more  FGR 2000»
14 years 1 months ago
Robust Facial Feature Localization by Coupled Features
In this paper, we consider the problem of robust localization of faces and some of their facial features. The task arises e.g. in the medical field of visual analysis of facial p...
Matthias Zobel, Arnd Gebhard, Dietrich Paulus, Joa...
ISSTA
2009
ACM
14 years 3 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan
ECMDAFA
2006
Springer
137views Hardware» more  ECMDAFA 2006»
14 years 21 days ago
Harvesting Software Systems for MDA-Based Reengineering
Abstract. In this paper we report on a feasibility study in reengineering legacy systems towards a model-driven architecture (MDA). Steps in our approach consist of (1) parsing the...
Thijs Reus, Hans Geers, Arie van Deursen
DASFAA
2007
IEEE
138views Database» more  DASFAA 2007»
14 years 3 months ago
An Original Semantics to Keyword Queries for XML Using Structural Patterns
XML is by now the de facto standard for exporting and exchanging data on the web. The need for querying XML data sources whose structure is not fully known to the user and the need...
Dimitri Theodoratos, Xiaoying Wu