Sciweavers

4693 search results - page 751 / 939
» Verifying Hybrid Systems
Sort
View
JEI
2008
129views more  JEI 2008»
15 years 4 months ago
Removable visible image watermarking algorithm in the discrete cosine transform domain
Abstract. A removable visible watermarking scheme, which operates in the discrete cosine transform (DCT) domain, is proposed for combating copyright piracy. First, the original wat...
Ying Yang, Xingming Sun, Hengfu Yang, Chang-Tsun L...
ITIIS
2010
191views more  ITIIS 2010»
15 years 3 months ago
Cooperative Multi-relay Scheme for Secondary Spectrum Access
In this paper, we propose a cooperative multi-relay scheme for a secondary system to achieve spectrum access along with a primary system. In the primary network, a primary transmi...
Tran Trung Duy, Hyung Yun Kong
SAB
2010
Springer
133views Optimization» more  SAB 2010»
15 years 3 months ago
Simulating Human Table Tennis with a Biomimetic Robot Setup
Playing table tennis is a difficult motor task which requires fast movements, accurate control and adaptation to task parameters. Although human beings see and move slower than mos...
Katharina Mülling, Jens Kober, Jan Peters
SEKE
2010
Springer
15 years 3 months ago
A Multi-State Bayesian Network for Shill Verification in Online Auctions
Online auction systems have made remarkable progress in recent years. However, one of the most severe and persistent problems in such systems is shilling behavior, which is a type ...
Ankit Goel, Haiping Xu, Sol M. Shatz
CASES
2010
ACM
15 years 3 months ago
Instruction selection by graph transformation
Common generated instruction selections are based on tree pattern matching, but modern and custom architectures feature instructions, which cannot be covered by trees. To overcome...
Sebastian Buchwald, Andreas Zwinkau