Sciweavers

1628 search results - page 62 / 326
» Compiler Construction Using Scheme
Sort
View
ITCC
2000
IEEE
15 years 4 months ago
Simple Collusion-Secure Fingerprinting Schemes for Images
This paper describes a robust watermarking algorithm and a collusion-secure fingerprinting scheme based on it. Watermarking robustness is obtained by using the JPEG algorithm to ...
Josep Domingo-Ferrer, Jordi Herrera-Joancomart&iac...
ICFP
2010
ACM
15 years 8 hour ago
ReCaml: execution state as the cornerstone of reconfigurations
Most current techniques fail to achieve the dynamic update of recursive functions. A focus on execution states appears to be essential in order to implement dynamic update in this...
Jérémy Buisson, Fabien Dagnat
ITIIS
2010
200views more  ITIIS 2010»
14 years 6 months ago
New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups
Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key...
Kwangsu Lee, Dong Hoon Lee
FDL
2007
IEEE
15 years 6 months ago
APDL: A Processor Description Language For Design Space Exploration of Embedded Processors
—This paper presents Anahita Processor Description Language (APDL) for generation of retargetable processor design tool sets. The emphasis is on the applicability of the generate...
Nima Honarmand, Hasan Sohofi, Maghsoud Abbaspour, ...
ITICSE
1996
ACM
15 years 4 months ago
Integrating animations into courses
This paper describes two ways we have integrated algorithm animations into several computer science courses. First, we use previously existing animations during lectures to aid in...
Susan H. Rodger