Sciweavers

JISE
2008
143views more  JISE 2008»
13 years 11 months ago
A Geometry-Based Secret Image Sharing Approach
This paper solves the visual cryptography problem by the Blakley scheme that is a geometry-based secret sharing strategy. We first partition the protected image into non-overlappi...
Chien-Chang Chen, Wen-Yin Fu
JISE
2008
65views more  JISE 2008»
13 years 11 months ago
Impromptu Service Discovery and Delivery in Mobile Environments
Choonhwa Lee, Sumi Helal, David Nordstedt
JISE
2008
151views more  JISE 2008»
13 years 11 months ago
Design of QoS and Admission Control for VoIP Services Over IEEE 802.11e WLANs
Supporting telephone services using wireless LAN as the access network is an important application nowadays. The SIP and IEEE 802.11e are the two most promising protocols to suppo...
Pei-Yeh Wu, Jen-Jee Chen, Yu-Chee Tseng, Hung-Wei ...
JISE
2008
39views more  JISE 2008»
13 years 11 months ago
Physically-Based Analysis and Rendering of Bidirectional Texture Functions Data
Ying-Chieh Chen, Sin-Jhen Chiu, Hsiang-Ting Chen, ...
JISE
2008
107views more  JISE 2008»
13 years 11 months ago
A State-Based Testing Approach for Aspect-Oriented Programming
abstract the state-based behavior of AOP program with the consideration of the interactions between the base modules and aspects. Based on the model, test cases can be derived so a...
Chien-Hung Liu, Chuan-Wen Chang
JISE
2008
65views more  JISE 2008»
13 years 11 months ago
Estimating Optical Flow by Integrating Multi-Frame Information
Chia-Ming Wang, Kuo-Chin Fan, Cheng-Tzu Wang
JISE
2008
83views more  JISE 2008»
13 years 11 months ago
Energy-Efficient Key-Management (EEKM) Protocol for Large-Scale Distributed Sensor Networks
Kwang-Jin Paek, Ui-Sung Song, Hye-Young Kim, Jongw...