The definition of the next generation of wireless networks is well under way within the IEEE 802.11 High Throughput Task Group committee. The resulting standard, to be called IEEE...
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
This paper presents a lossy compression method for motion capture data. Each degree of freedom of a motion clip is smoothed by an anisotropic diffusion process and then divided int...
Abstract. In this paper, we propose a practical real-time video watermarking scheme for downscaling attack. We embed watermark into an arbitrary size of a host video and extract it...
Kyung-Su Kim, Dong-Hyuck Im, Young-Ho Suh, Heung-K...
The paper describes the Executable Design Concept which is one of the main components of HeKatE: Hybrid Knowledge Engineering methodology. HeKatE project aims at developing a metho...