Sciweavers

340 search results - page 49 / 68
» ets 2009
Sort
View
69
Voted
ICFEM
2009
Springer
15 years 4 months ago
Qualitative Action Systems
An extension to action systems is presented facilitating the modeling of continuous behavior in the discrete domain. The original action system formalism has been developed by Back...
Bernhard K. Aichernig, Harald Brandl, Willibald Kr...
61
Voted
ICHIT
2009
Springer
15 years 4 months ago
An improved camera identification method based on the texture complexity and the image restoration
The identification of source camera is useful to improve the capability of evidence in the digital image such as distinguish the photographer taking illegal images and adopting di...
Kazuya Matsushita, Hitoshi Kitazawa
70
Voted
ICICS
2009
Springer
15 years 4 months ago
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher
The overall structure is one of the most important properties of block ciphers. At present, the most common structures include Feistel structure, SP structure, MISTY structure, L-M...
Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang
IH
2009
Springer
15 years 4 months ago
Estimating the Minimal Length of Tardos Code
Abstract. This paper estimates the minimal length of a binary probabilistic traitor tracing code. We consider the code construction proposed by G. Tardos in 2003, with the symmetri...
Teddy Furon, Luis Pérez-Freire, Arnaud Guya...
IWPEC
2009
Springer
15 years 4 months ago
Planar Capacitated Dominating Set Is W[1]-Hard
Given a graph G together with a capacity function c : V (G) → N, we call S ⊆ V (G) a capacitated dominating set if there exists a mapping f : (V (G) \ S) → S which maps every...
Hans L. Bodlaender, Daniel Lokshtanov, Eelko Penni...