Sciweavers

JSW
2008
97views more  JSW 2008»
13 years 11 months ago
Segmenting Histogram-based Robust Audio Watermarking Approach
Based on the invariant features and data distribution in time domain before and after attacking on the audio, it is clearly that the standard variance shows good invariant statisti...
Xiaoming Zhang
JSW
2008
152views more  JSW 2008»
13 years 11 months ago
Reasoning with Semantic Web Technologies in Ubiquitous Computing Environment
--The vast amounts of data about people, things and the environment will require new ways of handling, searching and presenting information. New applications will increasingly be a...
WenYing Guo
JSW
2008
203views more  JSW 2008»
13 years 11 months ago
Automatic Discovery of Semantic Relations Based on Association Rule
Automatic discovery of semantic relations between resources is a key issue in Web-based intelligent applications such as document understanding and Web services. This paper explore...
Xiangfeng Luo, Kai Yan, Xue Chen
JSW
2008
122views more  JSW 2008»
13 years 11 months ago
Modeling and Analysis the Web Structure Using Stochastic Timed Petri Nets
Precise analysis of the Web structure can facilitate data pre-processing and enhance the accuracy of the mining results in the procedure of Web usage mining. STPN Stochastic Timed...
Pozung Chen, Chu-Hao Sun, Shih-Yang Yang
JSW
2008
105views more  JSW 2008»
13 years 11 months ago
Formal Models for Architecture Aspects and Their Weaving
Aspect-oriented concepts are currently introduced in early stages of software development to achieve better separation of concerns. However, at the architecture level, there exists...
Chunhua Yang, Haiyang Wang
JSW
2008
167views more  JSW 2008»
13 years 11 months ago
An Approach to Discover Dependencies between Service Operations
Service composition is emerging as an important paradigm for constructing distributed applications by combining and reusing independently developed component services. One key issu...
Shuying Yan, Jing Wang 0002, Chen Liu, Lei Liu
JSW
2008
110views more  JSW 2008»
13 years 11 months ago
An Open Approach for the Applied Pi Calculus
A notion of open bisimulation is proposed for the Applied Pi Calculus, which extends -calculus in order to facilitate analyzing security protocols. Our notion is based on the label...
Han Zhu, Yonggen Gu, Xiaohong Wu
JSW
2008
98views more  JSW 2008»
13 years 11 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
JSW
2008
97views more  JSW 2008»
13 years 11 months ago
Exemplar-based Image Inpainting base on Structure Construction
Image inpainting technique is that repairs damaged area or remove areas in an image. In order to deal with this kind of problems, not only a robust image inpainting algorithm shoul...
Jason C. Hung, Chun-Hong Huang, Yi-Chun Liao, Nick...
JSW
2008
95views more  JSW 2008»
13 years 11 months ago
From Sensors to Assisted Driving - Bridging the Gap
Increasing traffic density enforces development of Advanced Driver Assistance Systems to cope with safety aspects. Such systems require serious amount of sensor data to deduce spat...
Marcus Tönnis, Jan-Gregor Fischer, Gudrun Kli...