Sciweavers

5457 search results - page 885 / 1092
» Software Component Independence
Sort
View
ICASSP
2008
IEEE
15 years 10 months ago
Forensic techniques for classifying scanner, computer generated and digital camera images
Digital images can be captured or generated by a variety of sources including digital cameras, scanners and computer graphics softwares. In many cases it is important to be able t...
Nitin Khanna, George T.-C. Chiu, Jan P. Allebach, ...
ISORC
2008
IEEE
15 years 10 months ago
Hardware Objects for Java
Java, as a safe and platform independent language, avoids access to low-level I/O devices or direct memory access. In standard Java, low-level I/O it not a concern; it is handled ...
Martin Schoeberl, Christian Thalinger, Stephan Kor...
MMSP
2008
IEEE
147views Multimedia» more  MMSP 2008»
15 years 10 months ago
Bit allocation for spatial scalability in H.264/SVC
Abstract—We propose a model-based spatial layer bit allocation algorithm for H.264/SVC in this work. The spatial scalability of H.264/SVC is achieved by a multi-layer approach, w...
Jiaying Liu, Yongjin Cho, Zongming Guo, C. C. Jay ...
ADBIS
2008
Springer
128views Database» more  ADBIS 2008»
15 years 10 months ago
Pylonix: A Database Module for Collaborative Document Management
Abstract. In today’s world, document management plays an increasingly important role. However, there is currently no solution to manage complex documents in an integrated manner....
Christian Tilgner, Dietrich Christopeit, Klaus R. ...
FSTTCS
2007
Springer
15 years 10 months ago
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography
Abstract. The abstraction of cryptographic operations by term algebras, called DolevYao models or symbolic cryptography, is essential in almost all tool-supported methods for provi...
Michael Backes, Markus Dürmuth, Ralf Küs...