Sciweavers

27 search results - page 3 / 6
» icita 2005
Sort
View
ICITA
2005
IEEE
14 years 3 months ago
Visual Steganalysis of LSB-Encoded Natural Images
Contemporary steganographic systems encode hidden messages inside the least significant bit layers of colour natural images. The presence of these messages is difficult to detect ...
Paul Andrew Watters, Frances Martin, H. Steffen St...
ICITA
2005
IEEE
14 years 3 months ago
Searching the Web: From Keywords to Semantic Queries
Within the emergent Semantic Web framework, the use of traditional web search engines based on keywords provided by the users is not adequate anymore. Instead, new methods based o...
José A. Royo, Eduardo Mena, Jorge Bernad, A...
ICITA
2005
IEEE
14 years 3 months ago
On Dynamic Routing and Wavelength Assignment in Multi-granular All-Optical Networks
In this paper, we investigate the dynamic RWA problem in networks comprising of all-optical switches based on the multi-granular architecture (MG_DRWA). With this adaptive archite...
Ching-Fang Hsu, Te-Lung Liu, Fang-Sheng Lin
ICITA
2005
IEEE
14 years 3 months ago
A Lightweight UI Software Infrastructure for Wrist-Based Displays: If Your Microwave Oven Could Talk to Your Watch, What Would I
Supporting a rich array of information sources is a key element to making highly mobile computing devices usable by the wider community. It is our belief that there will not be on...
Peter Hutterer, Mark T. Smith, John Ankcorn, Wayne...
ICITA
2005
IEEE
14 years 3 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon