Sciweavers

603 search results - page 51 / 121
» Embedded Formulas Extraction
Sort
View
ICIP
2006
IEEE
14 years 10 months ago
Towards a Robust Feature-Based Watermarking Scheme
This paper presents a feature-based watermarking scheme which is robust to geometric and common image processing attacks. The improved Harris corner detector is used to find the r...
Jonathan Weinheimer, Xiaojun Qi, Ji Qi
IPPS
2009
IEEE
14 years 3 months ago
Combating side-channel attacks using key management
Embedded devices are widely used in military and civilian operations. They are often unattended, publicly accessible, and thus vulnerable to physical capture. Tamper-resistant mod...
Donggang Liu, Qi Dong
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
DATE
2010
IEEE
148views Hardware» more  DATE 2010»
14 years 1 months ago
Scoped identifiers for efficient bit aligned logging
Abstract--Detailed diagnostic data is a prerequisite for debugging problems and understanding runtime performance in distributed wireless embedded systems. Severe bandwidth limitat...
Roy Shea, Mani B. Srivastava, Young Cho
STTT
2008
103views more  STTT 2008»
13 years 8 months ago
Model-based development of a course of action scheduling tool
Abstract. This paper shows how a formal method in the form of Coloured Petri Nets (CPNs) and the supporting CPN Tools have been used in the development of the Course of Action Sche...
Lars Michael Kristensen, Peter Mechlenborg, Lin Zh...