Sciweavers

1336 search results - page 83 / 268
» codes 2005
Sort
View
IWDW
2005
Springer
15 years 3 months ago
Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information
In a fingerprinting scheme a distributor places marks in each copy of a digital object. Placing different marks in different copies, uniquely identifies the recipient of each cop...
Miguel Soriano, Marcel Fernandez, Josep Cotrina Na...
VSTTE
2005
Springer
15 years 3 months ago
WYSINWYX: What You See Is Not What You eXecute
What You See Is Not What You eXecute: computers do not execute source-code programs; they execute machine-code programs that are generated from source code. Not only can the WYSINW...
Gogul Balakrishnan, Thomas W. Reps, David Melski, ...
ECOOP
2005
Springer
15 years 3 months ago
Towards Reusable Heterogeneous Data-Centric Disentangled Parts
This paper presents our ongoing research towards a safe system evolution. Our approach is based on data-centric, objectoriented systems. Within those systems we utilise (i) multi-...
Michael Reinsch, Takuo Watanabe
CSMR
2005
IEEE
15 years 3 months ago
An XML-Based Framework for Language Neutral Program Representation and Generic Analysis
XML applications are becoming increasingly popular to define structured or semi-structured constrained data in XML for special application areas. In pursuit there is a growing mom...
Raihan Al-Ekram, Kostas Kontogiannis
MMSEC
2005
ACM
114views Multimedia» more  MMSEC 2005»
15 years 3 months ago
Watermarking of MPEG-2 video in compressed domain using VLC mapping
In this work we propose a new algorithm for fragile, high capacity yet file-size preserving watermarking of MPEG-2 streams. Watermarking is done entirely in the compressed domain,...
Bijan G. Mobasseri, Michael P. Marcinak