Sciweavers

7080 search results - page 1296 / 1416
» Designing High Integrity Systems Using Aspects
Sort
View
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
139
Voted
FIRBPERF
2005
IEEE
259views Algorithms» more  FIRBPERF 2005»
15 years 8 months ago
Performance Issues in Video Streaming Environments
The main motivation for applying capacity planning techniques to the design of Internet-based video services is that very often these systems incur significant delays that decrea...
Giuliano Casale, Paolo Cremonesi, Giuseppe Serazzi...
MM
2005
ACM
147views Multimedia» more  MM 2005»
15 years 8 months ago
MediaMetro: browsing multimedia document collections with a 3D city metaphor
The MediaMetro application provides an interactive 3D visualization of multimedia document collections using a city metaphor. The directories are mapped to city layouts using algo...
Patrick Chiu, Andreas Girgensohn, Surapong Lertsit...
DRMTICS
2005
Springer
15 years 8 months ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
GECCO
2005
Springer
133views Optimization» more  GECCO 2005»
15 years 8 months ago
Tactical UGV navigation and logistics planning
The Army’s push towards developing highly flexible military teams that combine manned and unmanned units requires significant advances in the intelligence of the unmanned units ...
Talib S. Hussain, Daniel Cerys, David J. Montana, ...
« Prev « First page 1296 / 1416 Last » Next »