Sciweavers

1143 search results - page 184 / 229
» Extraction in software watermarking
Sort
View
ICIP
2006
IEEE
14 years 11 months ago
Digital Image Forensics for Identifying Computer Generated and Digital Camera Images
We describe a digital image forensics technique to distinguish images captured by a digital camera from computer generated images. Our approach is based on the fact that image acq...
Sintayehu Dehnie, Husrev T. Sencar, Nasir D. Memon
WWW
2009
ACM
14 years 10 months ago
Using static analysis for Ajax intrusion detection
We present a static control-flow analysis for JavaScript programs running in a web browser. Our analysis tackles numerous challenges posed by modern web applications including asy...
Arjun Guha, Shriram Krishnamurthi, Trevor Jim
WWW
2005
ACM
14 years 10 months ago
Debugging OWL ontologies
As an increasingly large number of OWL ontologies become available on the Semantic Web and the descriptions in the ontologies become more complicated, finding the cause of errors ...
Bijan Parsia, Evren Sirin, Aditya Kalyanpur
CHES
2009
Springer
248views Cryptology» more  CHES 2009»
14 years 10 months ago
The State-of-the-Art in IC Reverse Engineering
? This paper gives an overview of the place of reverse engineering (RE) in the semiconductor industry, and the techniques used to obtain information from semiconductor products. Th...
Randy Torrance, Dick James
SIGMOD
2006
ACM
107views Database» more  SIGMOD 2006»
14 years 10 months ago
Documentum ECI self-repairing wrappers: performance analysis
Documentum Enterprise Content Integration (ECI) services is a content integration middleware that provides one-query access to the Intranet and Internet content resources. The ECI...
Boris Chidlovskii, Bruno Roustant, Marc Brette