Sciweavers

1421 search results - page 210 / 285
» Algorithms for subsequence combinatorics
Sort
View
ISQED
2009
IEEE
328views Hardware» more  ISQED 2009»
15 years 11 months ago
VLSI architectures of perceptual based video watermarking for real-time copyright protection
For effective digital rights management (DRM) of multimedia in the framework of embedded systems, both watermarking and cryptography are necessary. In this paper, we present a wat...
Saraju P. Mohanty, Elias Kougianos, Wei Cai, Manis...
EDBT
2009
ACM
123views Database» more  EDBT 2009»
15 years 11 months ago
High-performance information extraction with AliBaba
A wealth of information is available only in web pages, patents, publications etc. Extracting information from such sources is challenging, both due to the typically complex langu...
Peter Palaga, Long Nguyen, Ulf Leser, Jörg Ha...
DATE
2009
IEEE
118views Hardware» more  DATE 2009»
15 years 10 months ago
Gate sizing for large cell-based designs
—Today, many chips are designed with predefined discrete cell libraries. In this paper we present a new fast gate sizing algorithm that works natively with discrete cell choices...
Stephan Held
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
15 years 10 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...
ICRA
2009
IEEE
165views Robotics» more  ICRA 2009»
15 years 10 months ago
Robust servo-control for underwater robots using banks of visual filters
—We present an application of machine learning to the semi-automatic synthesis of robust servo-trackers for underwater robotics. In particular, we investigate an approach based o...
Junaed Sattar, Gregory Dudek