Abstract. In this paper, we propose a practical real-time video watermarking scheme for downscaling attack. We embed watermark into an arbitrary size of a host video and extract it...
Kyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh, Heung-K...
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Transparent replication has been viewed as the holy grail of fault-tolerant computing. We discuss issues arising when using atomic broadcast to replicate services that are accesse...
Online communities are increasingly important in modern social life. Yet, the diverse collection of guidelines that have directed online community design may not be keeping pace w...
This paper presents a complete codesign environment for embedded systems which combines automatic partitioning with reuse from a module database. Special emphasis has been put on ...