Sciweavers

23704 search results - page 7 / 4741
» Data and Information as Property
Sort
View
81
Voted
IH
2001
Springer
15 years 2 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
SAS
1991
Springer
15 years 1 months ago
On Static Properties of Specialized Programs
Specializing programs by partial evaluation is well defined extensionally, but in practice no intensional properties, such as what the specialized programs will look like or how ...
Karoline Malmkjær
IJCAI
2007
14 years 11 months ago
Inferring Long-term User Properties Based on Users' Location History
Recent development of location technologies enables us to obtain the location history of users. This paper proposes a new method to infer users’ longterm properties from their r...
Yutaka Matsuo, Naoaki Okazaki, Kiyoshi Izumi, Yosh...
HT
2009
ACM
15 years 4 months ago
Statistical properties of inter-arrival times distribution in social tagging systems
Folksonomies provide a rich source of data to study social patterns taking place on the World Wide Web. Here we study the temporal patterns of users’ tagging activity. We show t...
Andrea Capocci, Andrea Baldassarri, Vito Domenico ...
86
Voted
IH
2001
Springer
15 years 2 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...