Sciweavers

553 search results - page 73 / 111
» On the Assessment of Generalisation Consistency
Sort
View
ICMCS
2005
IEEE
111views Multimedia» more  ICMCS 2005»
14 years 1 months ago
An audio spread-spectrum data hiding system with an informed embedding strategy adapted to a Wiener filtering based receiver
A particular application of audio data hiding systems and watermarking systems consists of using the audio signal as a transmission channel for binary information. The system shou...
Cléo Baras, Nicolas Moreau
SIBGRAPI
2005
IEEE
14 years 1 months ago
Ridge-Based Fingerprint Matching Using Hough Transform
Despite the efficacy of minutia-based fingerprint matching techniques for good-quality images captured by optical sensors, minutia-based techniques do not often perform so well on...
Aparecido Nilceu Marana, Anil K. Jain
WECWIS
2005
IEEE
130views ECommerce» more  WECWIS 2005»
14 years 1 months ago
Future Research Challenges in Business Agility - Time, Control and Information Systems
Today organizations face increasingly dynamic and competitive environments. Business agility aims to address these challenges. In this contribution, we aim to increase understandi...
Markus Strohmaier, Herwig Rollett
DRM
2005
Springer
14 years 1 months ago
Control flow based obfuscation
A software obfuscator is a program O to transform a source program P for protection against malicious reverse engineering. O should be correct (O(P) has same functionality with P)...
Jun Ge, Soma Chaudhuri, Akhilesh Tyagi
DIAGRAMS
2004
Springer
14 years 1 months ago
A Cognitive Processing Perspective on Student Programmers' 'Graphicacy'
The ‘graphicacy’ of student programmers was investigated using several cognitive tasks designed to assess ER knowledge representation at the perceptual, semantic and output lev...
Richard Cox, Pablo Romero, Benedict du Boulay, Rud...