Sciweavers

236 search results - page 27 / 48
» From Weak to Strong Watermarking
Sort
View
JSYML
2011
68views more  JSYML 2011»
13 years 22 days ago
Ramsey-like cardinals
This paper continues the study of the Ramsey-like large cardinals introduced in [Git09] and [WS08]. Ramsey-like cardinals are defined by generalizing the “existence of elementar...
Victoria Gitman
CONCUR
2009
Springer
14 years 4 months ago
Encoding Asynchronous Interactions Using Open Petri Nets
Abstract. We present an encoding for (bound) processes of the asynchronous CCS with replication into open Petri nets: ordinary Petri nets equipped with a distinguished set of open ...
Paolo Baldan, Filippo Bonchi, Fabio Gadducci
BIBE
2008
IEEE
109views Bioinformatics» more  BIBE 2008»
14 years 4 months ago
Retrieval and ranking of biomedical images using boosted haar features
— Retrieving similar images from large repository of heterogeneous biomedical images has been a difficult research task. In this paper, we develop a retrieval system that uses H...
Chandan K. Reddy, Fahima A. Bhuyan
ICC
2007
IEEE
124views Communications» more  ICC 2007»
14 years 4 months ago
Exploring the Local Connectivity Preference in Internet AS Level Topology
—The Internet AS level topology, upon which BGP4 runs, plays a vital role in the analysis and study of the global routing behavior. However, the study of the topology itself is n...
Guoqiang Zhang, Guoqing Zhang
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
14 years 4 months ago
Obfuscation for Cryptographic Purposes
Abstract. An obfuscation O of a function F should satisfy two requirements: firstly, using O it should be possible to evaluate F; secondly, O should not reveal anything about F th...
Dennis Hofheinz, John Malone-Lee, Martijn Stam