Sciweavers

2932 search results - page 527 / 587
» Higher order mining
Sort
View
AINA
2009
IEEE
14 years 2 months ago
JPEG Steganography: A Performance Evaluation of Quantization Tables
The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and effic...
Adel Almohammad, Gheorghita Ghinea, Robert M. Hier...
CISIS
2009
IEEE
14 years 2 months ago
Multiple-Paths Search with Concurrent Thread Scheduling for Fast AND/OR Tree Search
This paper proposes a fast AND/OR tree search algorithm using a multiple-paths concurrent search method. Conventional heuristic AND/OR tree search algorithms expand nodes in only ...
Fumiyo Takano, Yoshitaka Maekawa, Hironori Kasahar...
MSWIM
2009
ACM
14 years 2 months ago
Design and evaluation of host identity protocol (HIP) simulation framework for INET/OMNeT++
Host Identity Protocol (HIP) decouples IP addresses from higher layer Internet applications by proposing a new, cryptographic namespace for host identities. HIP has great potentia...
László Bokor, Szabolcs Novácz...
HAPTICS
2009
IEEE
14 years 2 months ago
Effects of magnitude and phase cues on human motor adaptation
Recent findings have shown that humans can adapt their internal control model to account for the changing dynamics of systems they manipulate. In this paper, we explore the effect...
Ali Israr, Hakan Kapson, Volkan Patoglu, Marcia Ki...
VR
2009
IEEE
136views Virtual Reality» more  VR 2009»
14 years 2 months ago
Does a Gradual Transition to the Virtual World increase Presence?
In order to increase a user’s sense of presence in an artificial environment some researchers propose a gradual transition from reality to the virtual world instead of immersin...
Frank Steinicke, Gerd Bruder, Klaus Hinrichs, Anth...