Sciweavers

61 search results - page 10 / 13
» Tradeoffs in the Complexity of Backdoor Detection
Sort
View
ICASSP
2008
IEEE
15 years 6 months ago
Collusion-aware traitor tracing in multimedia fingerprinting using sparse signal approximation
We pose the problem of tracing traitors, who have colluded to circumvent a multimedia fingerprinting system, as a sparse underdetermined linear problem. We propose a range of det...
David P. Varodayan, Christine Pépin
CGF
2010
198views more  CGF 2010»
14 years 11 months ago
Feature Preserving Mesh Generation from 3D Point Clouds
We address the problem of generating quality surface triangle meshes from 3D point clouds sampled on piecewise smooth surfaces. Using a feature detection process based on the cova...
Nader Salman, Mariette Yvinec, Quentin Méri...
111
Voted
TSP
2008
87views more  TSP 2008»
14 years 11 months ago
Interference Suppression for Memoryless Nonlinear Multiuser Systems Using Constellation Structure
A generalized concept of interference suppression is introduced for multiuser systems with a known memoryless transmit non-linearity, such as in the downlink amplifier of a satelli...
Ananya Sen Gupta, Andrew Singer
ICIP
2008
IEEE
16 years 1 months ago
Game-theoretic analysis of maximum-payoff multiuser collusion
Multiuser collusion is an effective attack against traitor-tracing multimedia fingerprinting, where a group of attackers collectively mount attacks to reduce their risk of being d...
H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu
HPCA
1998
IEEE
15 years 3 months ago
The Potential for Using Thread-Level Data Speculation to Facilitate Automatic Parallelization
As we look to the future, and the prospect of a billion transistors on a chip, it seems inevitable that microprocessors will exploit having multiple parallel threads. To achieve t...
J. Gregory Steffan, Todd C. Mowry