Sciweavers

87 search results - page 2 / 18
» Publicly Detectable Techniques for the Protection of Virtual...
Sort
View
DAC
1999
ACM
14 years 6 months ago
Behavioral Synthesis Techniques for Intellectual Property Protection
? The economic viability of the reusable core-based design paradigm depends on the development of techniques for intellectual property protection. We introduce the first dynamic wa...
Inki Hong, Miodrag Potkonjak
INFOCOM
2009
IEEE
14 years 8 hour ago
VISA: Virtual Scanning Algorithm for Dynamic Protection of Road Networks
—This paper proposes a VIrtual Scanning Algorithm (VISA), tailored and optimized for road network surveillance. Our design uniquely leverages upon the facts that (i) the movement...
Jaehoon Jeong, Yu Gu, Tian He, David Du
ACMSE
2009
ACM
13 years 12 months ago
AVARI: animated virtual agent retrieving information
Avari is a virtual receptionist for the Computer Science department at The University of North Carolina at Charlotte. Her components include background subtraction to detect a per...
Lauren Cairco, Dale-Marie Wilson, Vicky Fowler, Mo...
IH
2001
Springer
13 years 9 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
ISCAPDCS
2004
13 years 6 months ago
An Open Digest-based Technique for Spam Detection
A promising anti-spam technique consists in collecting users opinions that given email messages are spam and using this collective judgment to block message propagation to other u...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...