Sciweavers

137 search results - page 18 / 28
» DRM
Sort
View
DRM
2008
Springer
13 years 10 months ago
A decision theoretic framework for analyzing binary hash-based content identification systems
Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of ...
Avinash L. Varna, Ashwin Swaminathan, Min Wu
IJCAI
1989
13 years 9 months ago
Motion Planning of Multi-Joint Robotic Arm with Topological Dimension Reduction Method
This paper explores the realization of robotic arm motion planning, especially Findpath Problem, which is a basic motion planning problem that arises in the development of robotic...
Bo Zhang, Ling Zhang, Tian Zhang
FOSAD
2007
Springer
14 years 2 months ago
Trusted Mobile Platforms
This article addresses two main topics. Firstly, we review the operation of trusted computing technology, which now appears likely to be implemented in future mobile devices (inclu...
Eimear Gallery, Chris J. Mitchell
DRM
2007
Springer
14 years 2 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
DRM
2005
Springer
14 years 1 months ago
Watermarking and ownership problem: a revisit
Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of...
Husrev T. Sencar, Nasir D. Memon