Sciweavers

3852 search results - page 26 / 771
» Construction of Codes for Network Coding
Sort
View
DCC
2004
IEEE
15 years 9 months ago
On a Class of Traceability Codes
Traceability codes are designed to be used in schemes that protect copyrighted digital data against piracy. The main aim of this paper is to give an answer to a Staddon-Stinson-We...
Tran van Trung, Sosina Martirosyan
DCC
2011
IEEE
14 years 4 months ago
Directed graph representation of half-rate additive codes over GF(4)
We show that (n, 2n ) additive codes over GF(4) can be represented as directed graphs. This generalizes earlier results on self-dual additive codes over GF(4), which correspond to ...
Lars Eirik Danielsen, Matthew G. Parker
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....
GIS
2003
ACM
15 years 3 months ago
Construction of the planar partition postal code map based on cadastral reGIStration
Accurate postal code maps have many applications within GIS as the postal code has the potential to link the address description of buildings to their location in a specified glob...
Friso Penninga, Edward Verbree, Wilko Quak, Peter ...
NSDI
2004
14 years 11 months ago
Constructing Services with Interposable Virtual Hardware
Virtual machine monitors (VMMs) have enjoyed a resurgence in popularity, since VMMs can help to solve difficult systems problems like migration, fault tolerance, code sandboxing, ...
Andrew Whitaker, Richard S. Cox, Marianne Shaw, St...