Sciweavers

1856 search results - page 190 / 372
» Phoning it in
Sort
View
IWDW
2004
Springer
14 years 4 months ago
Alteration-Locating Authentication Watermarking for Binary Images
Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Hae Yong Kim, Ricardo L. de Queiroz
MHCI
2004
Springer
14 years 4 months ago
Comparison of Mobile and Fixed Use of SmartLibrary
Abstract. Finding books in large libraries can be difficult for novice library users. This paper presents the current status of SmartLibrary, a web-based guidance application helpi...
Markus Aittola, Pekka Parhi, Maria Vieruaho, Timo ...
PDP
2010
IEEE
14 years 4 months ago
Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices
—Data security is one of the major challenges that prevents the wider acceptance of mobile devices, especially within business and government environments. It is non-trivial to p...
Paolo Gasti, Yu Chen
FTDCS
2003
IEEE
14 years 4 months ago
Towards Middleware Services for Mobile Ad-Hoc Network Applications
Mobile ad-hoc networks are typically very dynamic networks in terms of available communication partners, available network resources, connectivity, etc. Furthermore, the end-user ...
Thomas Plagemann, Vera Goebel, Carsten Griwodz, P&...
ICDAR
2003
IEEE
14 years 4 months ago
Web Page Summarization for Handheld Devices: A Natural Language Approach
Summarization of web pages is a very interesting topic from both academic and commercial point of view. Academically, it is challenging to create a summary of a document (e.g. a w...
Hassan Alam, Rachmat Hartono, Aman Kumar, Ahmad Fu...