Sciweavers

666 search results - page 91 / 134
» Fair watermarking techniques
Sort
View
ACMACE
2006
ACM
15 years 3 months ago
3D object modelling for entertainment applications
Recent advances in three-dimensional (3D) data acquisition techniques have offered an alternative to the traditional 2D metamorphosis (or morphing) approaches, which gradually cha...
Yi Song, Li Bai, Yangsheng Wang
VMCAI
2005
Springer
15 years 3 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
DSN
2003
IEEE
15 years 3 months ago
ICR: In-Cache Replication for Enhancing Data Cache Reliability
Processor caches already play a critical role in the performance of today’s computer systems. At the same time, the data integrity of words coming out of the caches can have ser...
Wei Zhang 0002, Sudhanva Gurumurthi, Mahmut T. Kan...
FTDCS
2003
IEEE
15 years 3 months ago
Autonomous Decentralized Community Concept and Architecture for a Complex Adaptive Information System
The global information service in the Internet is a heterogeneous and rapidly evolving environment. Constantly, new information services are added, others are modified, removed or...
Khaled Ragab, Takanori Ono, Naohiro Kaji, Kinji Mo...
AUSAI
2003
Springer
15 years 3 months ago
Dynamic Agent Ordering in Distributed Constraint Satisfaction Problems
The distributed constraint satisfaction problem (CSP) is a general formalisation used to represent problems in distributed multiagent systems. To deal with realistic problems, mult...
Lingzhong Zhou, John Thornton, Abdul Sattar