Sciweavers

2421 search results - page 188 / 485
» Message from the Co-Chairs
Sort
View
JDCTA
2008
535views more  JDCTA 2008»
13 years 9 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
IPL
2006
88views more  IPL 2006»
13 years 9 months ago
A note on the attractor-property of infinite-state Markov chains
In the past 5 years, a series of verification algorithms has been proposed for infinite Markov chains that have a finite attractor, i.e., a set that will be visited infinitely oft...
Christel Baier, Nathalie Bertrand, Ph. Schnoebelen
CSI
2007
83views more  CSI 2007»
13 years 9 months ago
A model-driven choreography conceptual framework
A number of languages exist that try to model the external visible behavior of services. However, they constitute incomplete solutions, either because, they do not include proper ...
Sinuhé Arroyo, Alistair Duke, José M...
JNW
2008
101views more  JNW 2008»
13 years 9 months ago
Micro-controller based Remote Monitoring using Mobile through Spoken Commands
Mobile phone can serve as powerful tool for world-wide communication. A system is developed to remotely monitor process through spoken commands using mobile. Mel cepstrum features ...
Naresh P. Jawarkar, Vasif Ahmed, Siddharth A. Ladh...
JAR
2006
97views more  JAR 2006»
13 years 9 months ago
Decidability Issues for Extended Ping-Pong Protocols
We use some recent techniques from process algebra to draw several conclusions about the well studied class of ping-pong protocols introduced by Dolev and Yao. In particular we sho...
Hans Hüttel, Jirí Srba