Sciweavers

101 search results - page 19 / 21
» Fuzzy color signatures
Sort
View
ICCAD
1999
IEEE
108views Hardware» more  ICCAD 1999»
13 years 11 months ago
Copy detection for intellectual property protection of VLSI designs
We give the first study of copy detection techniques for VLSI CAD applications; these techniques are complementary to previous watermarking-based IP protection methods in finding ...
Andrew B. Kahng, Darko Kirovski, Stefanus Mantik, ...
TIFS
2008
179views more  TIFS 2008»
13 years 7 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 5 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
ICMCS
2009
IEEE
159views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Large-scale near-duplicate web video search: Challenge and opportunity
The massive amount of near-duplicate and duplicate web videos has presented both challenge and opportunity to multimedia computing. On one hand, browsing videos on Internet become...
Wanlei Zhao, Song Tan, Chong-Wah Ngo
IROS
2009
IEEE
140views Robotics» more  IROS 2009»
14 years 2 months ago
Transferring embodied concepts between perceptually heterogeneous robots
— This paper explores methods and representations that allow two perceptually heterogeneous robots, each of which represents concepts via grounded properties, to transfer knowled...
Zsolt Kira