Sciweavers

2184 search results - page 186 / 437
» Assistive Embedded Technologies
Sort
View
ISW
2001
Springer
15 years 9 months ago
Oblivious Image Watermarking Robust against Scaling and Geometric Distortions
Abstract. Watermarking stays the main technical safeguard of electronic copyright. This paper presents the first public-domain oblivious watermarking scheme for images which survi...
Francesc Sebé, Josep Domingo-Ferrer
IH
1999
Springer
15 years 9 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel
CARDIS
1998
Springer
161views Hardware» more  CARDIS 1998»
15 years 9 months ago
Formal Proof of Smart Card Applets Correctness
: The new Gemplus smart card is based on the Java technology, embedding a virtual machine. The security policy uses mechanisms that are based on Java properties. This language prov...
Jean-Louis Lanet, Antoine Requet
CODES
1996
IEEE
15 years 9 months ago
A Model for the Coanalysis of Hardware and Software Architectures
Successful """tiprocessor system design for complex realtime embedded applications requires powerful and comprehensive. yet cost-effective. productive. and maintain...
Fred Rose, Todd Carpenter, Sanjaya Kumar, John Sha...
IASTEDSEA
2004
15 years 6 months ago
A component model for building systems software
OpenCOM v2 is our experimental language-independent component-based systems-building technology. OpenCOM offers more than merely a component-based programming model. First, it is ...
Geoff Coulson, Gordon S. Blair, Paul Grace, Ackbar...