Sciweavers

909 search results - page 176 / 182
» Reversible data hiding
Sort
View
SMI
2005
IEEE
111views Image Analysis» more  SMI 2005»
14 years 1 months ago
Rational Spherical Splines for Genus Zero Shape Modeling
Traditional approaches for modeling a closed manifold surface with either regular tensor-product or triangular splines (defined over an open planar domain) require decomposing th...
Ying He 0001, Xianfeng Gu, Hong Qin
SIGSOFT
2005
ACM
14 years 1 months ago
Detecting higher-level similarity patterns in programs
Cloning in software systems is known to create problems during software maintenance. Several techniques have been proposed to detect the same or similar code fragments in software...
Hamid Abdul Basit, Stan Jarzabek
CEAS
2005
Springer
14 years 1 months ago
Searching For John Doe: Finding Spammers and Phishers
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity ...
Aaron E. Kornblum
COOPIS
2002
IEEE
14 years 20 days ago
Discovering Emergent Virtual Work Processes in Collaborative Systems
The design of virtual workplaces that can support virtual work processes has traditionally been either ad-hoc, or has been influenced by the top-down approaches, such as ‘virtua...
Simeon J. Simoff, Robert P. Biuk-Aghai
ICSE
2000
IEEE-ACM
13 years 11 months ago
Workshop on standard exchange format (WoSEF)
A workshop was held at ICSE 2000 in Limerick, Ireland to further efforts in the development of a standard exchange format (SEF) for data extracted from and about source code. WoSE...
Susan Elliott Sim, Richard C. Holt, Rainer Koschke