Sciweavers

INFORMATICALT
2007
112views more  INFORMATICALT 2007»
14 years 10 days ago
Look-up Table Based Reversible Data Hiding for Error Diffused Halftone Images
This paper proposes a reversible data hiding method for error diffused halftone images. It employs statistics feature of pixel block patterns to embed data, and utilizes the HVS ch...
Jeng-Shyang Pan, Hao Luo, Zhe-Ming Lu
INFORMATICALT
2007
92views more  INFORMATICALT 2007»
14 years 10 days ago
An Optimization of System for Automatic Recognition of Ischemic Stroke Areas in Computed Tomography Images
Abstract. The paper considers application of stochastic optimization to system of automatic recognition of ischemic stroke area on computed tomography (CT) images. The algorithm of...
Darius Grigaitis, Vaida Bartkute, Leonidas Sakalau...
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
14 years 10 days ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo
INFORMATICALT
2007
97views more  INFORMATICALT 2007»
14 years 10 days ago
Fabric Level and Application Level QoS Guarantees in Grid Computing
In the paper, a cross-layer optimization between application layer and fabric layer is proposed. The aim is to optimize the end-to-end quality of the dynamic grid application as we...
Li Chunlin, Li Layuan
INFORMATICALT
2007
164views more  INFORMATICALT 2007»
14 years 10 days ago
Extracting Personalised Ontology from Data-Intensive Web Application: an HTML Forms-Based Reverse Engineering Approach
The advance of the Web has significantly and rapidly changed the way of information organization, sharing and distribution. The next generation of the web, the semantic web, seeks...
Sidi Mohamed Benslimane, Mimoun Malki, Mustapha Ka...
INFORMATICALT
2007
122views more  INFORMATICALT 2007»
14 years 10 days ago
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys
In 2004, Abe et al. proposed a threshold signer-ambiguous signature scheme from variety of keys. Their scheme is a generalized case of the ring signature scheme, and it allows the ...
Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin
INFORMATICALT
2007
136views more  INFORMATICALT 2007»
14 years 10 days ago
Generic Multimedia Database Architecture Based upon Semantic Libraries
Semantic-based storage and retrieval of multimedia data requires accurate annotation of the data. Annotation can be done either manually or automatically. The retrieval performance...
Omara Abdul Hamid, Muhammad Abdul Qadir, Nadeem If...
INFORMATICALT
2007
106views more  INFORMATICALT 2007»
14 years 10 days ago
Framework for Choosing a Set of Syllables and Phonemes for Lithuanian Speech Recognition
This paper describes a framework for making up a set of syllables and phonemes that subsequently is used in the creation of acoustic models for continuous speech recognition of Lit...
Sigita Laurinciukaite, Antanas Lipeika
INFORMATICALT
2007
101views more  INFORMATICALT 2007»
14 years 10 days ago
Internationalization of Compilers
Internationalization of compilers and localization of programming languages is not a usual phenomenon yet; however, due to a rapid progress of software and programming technologies...
Valentina Dagiene, Rimgaudas Laucius