Abstract. Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel. Traitor tracing is needed because some ...
The clipping of log-likelihood ratios (LLRs) in soft demodulators for multiple-input multiple-output (MIMO) systems with bitinterleaved coded modulation (BICM) was recently observ...
Stefan Schwandter, Peter Fertl, Clemens Novak, Ger...
This paper presents experiments with the ORFEO ToolBox (OTB) developed by the CNES in the context of the Brussels project ARMURS about map updating. Depending on the availability ...
Christophe Simler, Charles Beumier, Christine Leig...
Recent research results have shown more benefits of the management of code clones, rather than detecting and removing them. However, existing clone management approaches are stil...
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
This paper introduces the design of context-based models of contours in the wavelet domain, which are used to construct generalized lifting (GL) mappings for image compression. Th...
Julio C. Rolon, Antonio Ortega, Philippe Salembier