Sciweavers

909 search results - page 57 / 182
» Reversible data hiding
Sort
View
GIS
2009
ACM
14 years 5 months ago
Constrained reverse nearest neighbor search on mobile objects
In this paper, we formalize the novel concept of Constrained Reverse k-Nearest Neighbor (CRkNN) search on mobile objects (clients) performed at a central server. The CRkNN query c...
Tobias Emrich, Hans-Peter Kriegel, Peer Kröge...
CSMR
2005
IEEE
14 years 3 months ago
Maintenance and Analysis of Visual Programs -- An Industrial Case
A domain-specific visual language, Function Block Language (FBL), is used in Metso Automation for writing automation control programs. The same engineering environment is used for...
Mika Karaila, Tarja Systä
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 10 months ago
Data security in mobile devices by geo locking
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and ...
M. Prabu Kumar, K. Praneesh Kumar Yadav
DAS
2006
Springer
14 years 2 days ago
XCDF: A Canonical and Structured Document Format
Accessing the structured content of PDF document is a difficult task, requiring pre-processing and reverse engineering techniques. In this paper, we first present different methods...
Jean-Luc Bloechle, Maurizio Rigamonti, Karim Hadja...
MS
2003
13 years 11 months ago
Dynamic Model of Nickel Hydrogen Battery - The Virtual Test Bed Implementation
A dynamic model of a nickel hydrogen battery implemented in the Virtual Test Bed (VTB) is presented. The battery system is simplified as such one-electrontransfer redox reaction o...
Shengyi Liu, Roger Dougal, John W. Weidner, Lijun ...