Sciweavers

666 search results - page 89 / 134
» Fair watermarking techniques
Sort
View
ICIP
2006
IEEE
15 years 11 months ago
Selfish Colluder Detection and Identification in Traitors within Traitors
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same r...
H. Vicky Zhao, K. J. Ray Liu
SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
15 years 10 months ago
Provenance management in curated databases
Curated databases in bioinformatics and other disciplines are the result of a great deal of manual annotation, correction and transfer of data from other sources. Provenance infor...
Peter Buneman, Adriane Chapman, James Cheney
ISVC
2009
Springer
15 years 4 months ago
Combinatorial Preconditioners and Multilevel Solvers for Problems in Computer Vision and Image Processing
Abstract. Linear systems and eigen-calculations on symmetric diagonally dominant matrices (SDDs) occur ubiquitously in computer vision, computer graphics, and machine learning. In ...
Ioannis Koutis, Gary L. Miller, David Tolliver
DATE
2008
IEEE
137views Hardware» more  DATE 2008»
15 years 4 months ago
SPARE - a Scalable algorithm for passive, structure preserving, Parameter-Aware model order REduction
In this paper we describe a flexible and efficient new algorithm for model order reduction of parameterized systems. The method is based on the reformulation of the parametric s...
Jorge Fernandez Villena, Luis Miguel Silveira
ICCCN
2008
IEEE
15 years 4 months ago
Addressing Heterogeneity, Scalability, and Privacy in Layered Multicast Congestion Control
—Multicast is attracting a resurgence of interest because it has a potential to address the explosively growing need for efficient streaming of large-volume Internet content. Ho...
Sergey Gorinsky, K. K. Ramakrishnan, Harrick M. Vi...