This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
In this paper, we propose a new approach for the automatic audio-based out-of-scene detection of audio-visual data, recorded by different cameras, camcorders or mobile phones duri...
In this paper, we present a new framework that performs automated local wall motion analysis based on the combined information derived from a rest and stress sequence (a full stres...
Sarina Mansor, Nicholas P. Hughes, J. Alison Nob...
An essential problem for biologists is the processing and evaluation of BLAST results. We advocate the deployment of database technology and describe a userdriven tool, called Bla...
William G. Farmerie, Joachim Hammer, Li Liu, Marku...
After write operations, BIST schemes for RAMs relying on signature analysis must compress the entire memory contents to update the reference signature. This paper introduces a new...
Vyacheslav N. Yarmolik, Sybille Hellebrand, Hans-J...