We revisit the problem of scheduling the sources transmissions in a many-to-one flow to provide reliable communication between n sources and a single destination. The performance o...
: We investigate image steganography under re-encoding of images. After a secret message or a digital watermark is embedded into a jpeg image, quite frequently the image is re-enco...
We describe a code reuse tool for use in the Looking Glass IDE, the successor to Storytelling Alice [17], which enables middle school students with little to no programming experi...
Paul A. Gross, Micah S. Herstand, Jordana W. Hodge...
In spite of recent progress in the development of hybrid block-based video codecs, it has been shown that for low-bitrate scenarios there is still coding gain applying object-base...
Matthias Kunter, Andreas Krutz, Michael Drose, Mic...
—Determining who are the copyright owners of a software system is important as they are the individuals and organizations that license the software to its users, and ultimately t...