Sciweavers

1018 search results - page 145 / 204
» Generative unbinding of names
Sort
View
IH
1998
Springer
14 years 1 months ago
Secure Copyright Protection Techniques for Digital Images
This paper2 presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images ...
Alexander Herrigel, Joseph Ó Ruanaidh, Holg...
ICCD
1993
IEEE
90views Hardware» more  ICCD 1993»
14 years 1 months ago
Subterranean: A 600 Mbit/Sec Cryptographic VLSI Chip
In this paper the design of a high-speed cryptographic coprocessor is presented. This coprocessor is named Subterranean and can be used for both cryptographic pseudorandom sequenc...
Luc J. M. Claesen, Joan Daemen, Mark Genoe, G. Pee...
ISCAS
1994
IEEE
138views Hardware» more  ISCAS 1994»
14 years 1 months ago
High-Throughput Data Compressor Designs Using Content Addressable Memory
This paper presents a novel VLSI architecture for high-speed data compressor designs which implement the well-known LZ77 algorithm. The architecture mainly consists of three units...
Ren-Yang Yang, Chen-Yi Lee
CHI
2007
ACM
14 years 1 months ago
A familiar face(book): profile elements as signals in an online social network
Using data from a popular online social network site, this paper explores the relationship between profile structure (namely, which fields are completed) and number of friends, gi...
Cliff Lampe, Nicole Ellison, Charles Steinfield
ICPR
2010
IEEE
14 years 1 months ago
CDP Mixture Models for Data Clustering
—In Dirichlet process (DP) mixture models, the number of components is implicitly determined by the sampling parameters of Dirichlet process. However, this kind of models usually...
Yangfeng Ji, Tong Lin, Hongbin Zha