Sciweavers

412 search results - page 70 / 83
» A New Proof of the F5 Algorithm
Sort
View
IH
2001
Springer
15 years 2 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
PODS
1997
ACM
124views Database» more  PODS 1997»
15 years 1 months ago
Languages for Relational Databases over Interpreted Structures
We rework parts of the classical relational theory when the underlying domain is a structure with some interpreted operations that can be used in queries. We identify parts of the...
Michael Benedikt, Leonid Libkin
EI
1998
74views more  EI 1998»
14 years 11 months ago
Multi-spectral-based Color Reproduction Research at the Munsell Color Science Laboratory
The traditional techniques of image capture, scanning, proofing, and separating do not take advantage of colorimetry and spectrophotometry. For critical color-matching application...
Roy S. Berns, Francisco H. Imai, Peter D. Burns, D...
ECCC
2006
77views more  ECCC 2006»
14 years 9 months ago
Extractors and condensers from univariate polynomials
We give new constructions of randomness extractors and lossless condensers that are optimal to within constant factors in both the seed length and the output length. For extractor...
Venkatesan Guruswami, Christopher Umans, Salil P. ...
SOCO
2008
Springer
14 years 9 months ago
Interface Composition for Web Service Intermediaries
Abstract. The use of XML as a format for message exchange makes Web services well suited for composition of heterogeneous components. However, since clients must manage differences...
Sara Forghanizadeh, Eric Wohlstadter