Sciweavers

909 search results - page 65 / 182
» Reversible data hiding
Sort
View
ICDCS
2008
IEEE
14 years 4 months ago
Securing Wireless Data Networks against Eavesdropping using Smart Antennas
In this paper, we focus on securing communication over wireless data networks from malicious eavesdroppers, using smart antennas. While conventional cryptography based approaches ...
Sriram Lakshmanan, Cheng-Lin Tsao, Raghupathy Siva...
VL
2005
IEEE
135views Visual Languages» more  VL 2005»
14 years 3 months ago
Easing Program Comprehension by Sharing Navigation Data
Large software projects often require a programmer to make changes to unfamiliar source code. This paper describes a set of tools, called Team Tracks, designed to ease program com...
Robert DeLine, Mary Czerwinski, George G. Robertso...
MICRO
1997
IEEE
93views Hardware» more  MICRO 1997»
14 years 2 months ago
A Comparison of Data Prefetching on an Access Decoupled and Superscalar Machine
In this paper we investigate the behavior of data prefetching on an access decoupled machine and a superscalar machine. We assess if there are bene ts to using the decoupling para...
G. P. Jones, Nigel P. Topham
ECAI
2008
Springer
14 years 14 hour ago
Agents Preferences in Decentralized Task Allocation
The ability to express preferences for specific tasks in multi-agent auctions is an important element for potential users who are considering to use such auctioning systems. This p...
Mark Hoogendoorn, Maria L. Gini
ISTA
2008
13 years 11 months ago
Foundational Data Modeling and Schema Transformations for XML Data Engineering
As XML data storage and interchange become ubiquitous, analysts and data engineers increasingly need tools to model their data and map it to XML schemas and to reverse engineer XML...
Reema Al-Kamha, David W. Embley, Stephen W. Liddle