Sciweavers

6769 search results - page 137 / 1354
» A new concept of robustness
Sort
View
IH
2001
Springer
14 years 1 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
HICSS
2000
IEEE
139views Biometrics» more  HICSS 2000»
14 years 1 months ago
Air Cargo Transport by Multi-Agent based Planning
Most major airlines decide to take new strategies for the competition in the air cargo industry. They are concerned with assigning cargo over flights in creative ways. This paper ...
Keqiang Zhu, M. W. Ludema, Rob E. C. M. van der He...
PLDI
2000
ACM
14 years 1 months ago
Exploiting superword level parallelism with multimedia instruction sets
Increasing focus on multimedia applications has prompted the addition of multimedia extensions to most existing general purpose microprocessors. This added functionality comes pri...
Samuel Larsen, Saman P. Amarasinghe
ICCD
1994
IEEE
69views Hardware» more  ICCD 1994»
14 years 1 months ago
Optimal Design of Self-Damped Lossy Transmission Lines for Multichip Modules
This paper presents a simple and robust method of designing the lossy-transmission-line interconnects in a network for multichip modules. This method uses wire-sizing entirely to ...
Jimmy Shinn-Hwa Wang, Wayne Wei-Ming Dai
ADC
2008
Springer
153views Database» more  ADC 2008»
13 years 11 months ago
A Confidence Based Recognition System for TV Commercial Extraction
Automatic real-time recognition of TV commercials is an essential step for TV broadcast monitoring. It comprises two basic tasks: rapid detection of known commercials that are sto...
Yijun Li, Dianqing Zhang, Xiangmin Zhou, Jesse S. ...