Abstract. In image authentication watermarking, hidden data is inserted into an image to detect any accidental or malicious image alteration. In the literature, quite a small numbe...
Abstract. Finding books in large libraries can be difficult for novice library users. This paper presents the current status of SmartLibrary, a web-based guidance application helpi...
Markus Aittola, Pekka Parhi, Maria Vieruaho, Timo ...
—Data security is one of the major challenges that prevents the wider acceptance of mobile devices, especially within business and government environments. It is non-trivial to p...
Mobile ad-hoc networks are typically very dynamic networks in terms of available communication partners, available network resources, connectivity, etc. Furthermore, the end-user ...
Thomas Plagemann, Vera Goebel, Carsten Griwodz, P&...
Summarization of web pages is a very interesting topic from both academic and commercial point of view. Academically, it is challenging to create a summary of a document (e.g. a w...
Hassan Alam, Rachmat Hartono, Aman Kumar, Ahmad Fu...