Sciweavers

666 search results - page 93 / 134
» Fair watermarking techniques
Sort
View
ISCAS
1994
IEEE
60views Hardware» more  ISCAS 1994»
15 years 2 months ago
A Comparison of First and Second Generation Switched-Current Cells
The Switched-Current SI technique is a circuit method that enables analog sampled-data circuits to be realized with a standard digital CMOS process. At this time it is fair to say...
Peter M. Sinn, Gordon W. Roberts
AUSAI
2006
Springer
15 years 1 months ago
Detecting Anomalies and Intruders
Brittleness is a well-known problem in expert systems where a conclusion can be made, which human common sense would recognise as impossible e.g. that a male is pregnant. We have e...
Akara Prayote, Paul Compton
FSE
2006
Springer
137views Cryptology» more  FSE 2006»
15 years 1 months ago
A Study of the MD5 Attacks: Insights and Improvements
MD5 is a well-known and widely-used cryptographic hash function. It has received renewed attention from researchers subsequent to the recent announcement of collisions found by Wa...
John Black, Martin Cochran, Trevor Highland
NSDI
2008
15 years 7 days ago
Nysiad: Practical Protocol Transformation to Tolerate Byzantine Failures
The paper presents and evaluates Nysiad,1 a system that implements a new technique for transforming a scalable distributed system or network protocol tolerant only of crash failur...
Chi Ho, Robbert van Renesse, Mark Bickford, Danny ...
DATE
2008
IEEE
142views Hardware» more  DATE 2008»
14 years 11 months ago
Algorithms for Maximum Satisfiability using Unsatisfiable Cores
Many decision and optimization problems in Electronic Design Automation (EDA) can be solved with Boolean Satisfiability (SAT). Moreover, well-known extensions of SAT also find app...
João Marques-Silva, Jordi Planes