Sciweavers

427 search results - page 86 / 86
» Implementing Real-Time Update of Access Control Policies
Sort
View
JTAER
2008
82views more  JTAER 2008»
13 years 4 months ago
The Use of Digital Watermarking for Intelligence Multimedia Document Distribution
Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents. Various watermarking techniques have been proposed to protect cop...
Shing-Chi Cheung, Dickson K. W. Chiu, Cedric Ho
ENTCS
2007
168views more  ENTCS 2007»
13 years 4 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...