Sciweavers

5766 search results - page 103 / 1154
» Reverse Engineering of Data
Sort
View
IEEEHPCS
2010
14 years 4 months ago
Robust lossless data hiding: Analysis and evaluation
Robust lossless data hiding (LDH) methods have attracted more and more attentions for copyright protection of multimedia in lossy environment. One of the important requirements of...
Lingling An, Xinbo Gao, Cheng Deng, Feng Ji
PC
2007
133views Management» more  PC 2007»
14 years 9 months ago
Data distribution for dense factorization on computers with memory heterogeneity
In this paper, we study the problem of optimal matrix partitioning for parallel dense factorization on heterogeneous processors. First, we outline existing algorithms solving the ...
Alexey L. Lastovetsky, Ravi Reddy
VL
2010
IEEE
209views Visual Languages» more  VL 2010»
14 years 8 months ago
Automatically Inferring ClassSheet Models from Spreadsheets
Many errors in spreadsheet formulas can be avoided if spreadsheets are built automatically from higher-level models that can encode and enforce consistency constraints. However, d...
Jacome Cunha, Martin Erwig, Joao Saraiva
ARTCOM
2009
IEEE
15 years 3 months ago
Text Fusion Watermarking in Medical Image with Semi-reversible for Secure Transfer and Authentication
Nowadays, the transmission of digitized medical information has become very convenient due to the generality of Internet. Internet has created the biggest benefit to achieve the tr...
P. Viswanathan, P. Venkata Krishna
77
Voted
PODS
2008
ACM
155views Database» more  PODS 2008»
15 years 10 months ago
The recovery of a schema mapping: bringing exchanged data back
A schema mapping is a specification that describes how data from a source schema is to be mapped to a target schema. Once the data has been transferred from the source to the targ...
Marcelo Arenas, Jorge Pérez, Cristian River...