Sciweavers

4113 search results - page 9 / 823
» Watermarking Relational Databases
Sort
View
MM
2000
ACM
112views Multimedia» more  MM 2000»
15 years 1 months ago
How to bypass the Wassenaar arrangement: a new application for watermarking
The scope of this article is to clarify the current legal and political situation related to electronic surveillance on the one hand, and to export regulations for encryption soft...
Franck Leprévost, Raphaël Erard, Toura...
ICVGIP
2004
14 years 11 months ago
Watermarking Scheme for Blind Quality Assessment in Multimedia Mobile Communication Services
Due to the advancement in digital wireless communication 3rd/future generation mobile communication system expects to offer multimedia services and applications with negotiated en...
Santi P. Maity, Malay Kumar Kundu, Prasanta Kumar ...
IJNSEC
2010
141views more  IJNSEC 2010»
14 years 4 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
ER
2007
Springer
167views Database» more  ER 2007»
15 years 1 months ago
An Unified Dynamic Description Logic Model for Databases: Relational Data, Relational Operations and Queries
The paper presents an unified Description Logic (DL) model for databases. Describing database models using DLs is a fundamental problem in many areas because it turns databases to...
Guoshun Hao, Shilong Ma, Yuefei Sui, Jianghua Lv
SSDBM
2005
IEEE
131views Database» more  SSDBM 2005»
15 years 3 months ago
Searching for Related Objects in Relational Databases
To discover knowledge or retrieve information from a relational database, a user often needs to find objects related to certain source objects. There are two main challenges in b...
Xiaoxin Yin, Jiawei Han, Jiong Yang