Sciweavers

603 search results - page 74 / 121
» Embedded Formulas Extraction
Sort
View
EDBT
2002
ACM
112views Database» more  EDBT 2002»
14 years 9 months ago
Querying with Intrinsic Preferences
The handling of user preferences is becoming an increasingly important issue in present-day information systems. Among others, preferences are used for information filtering and ex...
Jan Chomicki
VMCAI
2010
Springer
14 years 6 months ago
Shape Analysis of Low-Level C with Overlapping Structures
Abstract. Device drivers often keep data in multiple data structures simultaneously while embedding list or tree related records into the records containing the actual data; this r...
Jörg Kreiker, Helmut Seidl, Vesal Vojdani
IH
2009
Springer
14 years 3 months ago
Forensic Tracking Watermarking against In-theater Piracy
Many illegal copies of digital movies by camcorder capture are found on the Internet or on the black market before their official release. Due to the angle of the camcorder relativ...
Min-Jeong Lee, Kyung-Su Kim, Heung-Kyu Lee
IWDW
2009
Springer
14 years 3 months ago
Local Patch Blind Spectral Watermarking Method for 3D Graphics
In this paper, we propose a blind watermarking algorithm for 3D meshes. The proposed algorithm embeds spectral domain constraints in segmented patches. After aligning the 3D object...
Ming Luo, Kai Wang, Adrian G. Bors, Guillaume Lavo...
DATE
2008
IEEE
106views Hardware» more  DATE 2008»
14 years 3 months ago
Modeling Event Stream Hierarchies with Hierarchical Event Models
Compositional Scheduling Analysis couples local scheduling analysis via event streams. While local analysis has successfully been extended to include hierarchical scheduling strat...
Jonas Rox, Rolf Ernst