In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
Database-centric information systems are critical to the operations of large organisations. In particular, they often process a large amount of data with stringent performance req...
Proponents of utility-based scheduling policies have shown the potential for a 100–1400% increase in value-delivered to users when used in lieu of traditional approaches such as...
We propose an empirical, perception-based evaluation approach for assessing the effectiveness and efficiency of longstanding cartographic design principles applied to 2D map displa...
This study of the flow of online discussions examined how earlier messages affected later messages along five dimensions: (1) evaluations (agree, disagree, or unresponsive actions...