Sciweavers

521 search results - page 47 / 105
» Content in Embedded Sentences
Sort
View
IH
1999
Springer
14 years 2 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel
JFP
2002
100views more  JFP 2002»
13 years 9 months ago
A typed representation for HTML and XML documents in Haskell
We define a family of embedded domain specific languages for generating HTML and XML documents. Each language is implemented as a combinator library in Haskell. The generated HTML...
Peter Thiemann
AAECC
2006
Springer
114views Algorithms» more  AAECC 2006»
14 years 3 months ago
Traitor Tracing Against Powerful Attacks Using Combinatorial Designs
This paper addresses the problem of threshold traitor tracing for digital content where, by embedding appropriate digital patterns into the distributed content, it is possible to t...
Simon McNicol, Serdar Boztas, Asha Rao
MM
2004
ACM
109views Multimedia» more  MM 2004»
14 years 3 months ago
Reading movies: an integrated DVD player for browsing movies and their scripts
We have built over the last few years an integrated browser and query interface for watching a movie synchronized with its script. The system is demonstrated with the movie ’The...
Rémi Ronfard
DATE
2010
IEEE
107views Hardware» more  DATE 2010»
14 years 3 months ago
Worst case delay analysis for memory interference in multicore systems
Abstract—Employing COTS components in real-time embedded systems leads to timing challenges. When multiple CPU cores and DMA peripherals run simultaneously, contention for access...
Rodolfo Pellizzoni, Andreas Schranzhofer, Jian-Jia...