Sciweavers

236 search results - page 13 / 48
» From Weak to Strong Watermarking
Sort
View
ISM
2006
IEEE
114views Multimedia» more  ISM 2006»
14 years 3 months ago
Mobile DRM-Enabled Multimedia Platform for Peer-to-Peer Applications
A mobile Digital Rights Management platform is proposed that follows the DRM reference architecture while including several important functions lacking in the OMA DRM. The platfor...
Mikko Löytynoja, Timo Koskela, Marko Brockman...
DSN
2006
IEEE
14 years 3 months ago
Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony
This paper considers the eventual leader election problem in asynchronous message-passing systems where an arbitrary number t of processes can crash (t < n, where n is the tota...
Antonio Fernández, Ernesto Jiménez, ...
TYPES
2004
Springer
14 years 3 months ago
Extracting a Normalization Algorithm in Isabelle/HOL
We present a formalization of a constructive proof of weak normalization for the simply-typed λ-calculus in the theorem prover Isabelle/HOL, and show how a program can be extracte...
Stefan Berghofer
AAMAS
2005
Springer
13 years 9 months ago
Learning and Exploiting Relative Weaknesses of Opponent Agents
Agents in a competitive interaction can greatly benefit from adapting to a particular adversary, rather than using the same general strategy against all opponents. One method of s...
Shaul Markovitch, Ronit Reger
ICDCS
1995
IEEE
14 years 1 months ago
Specifying Weak Sets
nt formal speci cations of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide...
Jeannette M. Wing, David C. Steere