Sciweavers

137 search results - page 11 / 28
» Hybrid Traitor Tracing
Sort
View
DCC
2007
IEEE
13 years 7 months ago
Sequential and dynamic frameproof codes
There are many schemes in the literature for protecting digital data from piracy by the use of digital fingerprinting, such as frameproof codes and traitor-tracing schemes. The c...
Maura B. Paterson
HYBRID
1994
Springer
13 years 11 months ago
Programming in Hybrid Constraint Languages
Abstract. We present a language,Hybrid cc, for modeling hybrid systems compositionally. This language is declarative, with programs being understood as logical formulas that place ...
Vineet Gupta, Radha Jagadeesan, Vijay A. Saraswat,...
ICC
2007
IEEE
206views Communications» more  ICC 2007»
14 years 1 months ago
Buffer Occupation Probability of Trace-Driven Background Streams in Hybrid Simulation
— In this paper, numerical calculation schemes of the buffer occupation probability for a buffer which is fed by a large number of independent and stationary sources are evaluate...
Ben Lauwens, Bart Scheers, Antoine Van de Capelle
CG
1999
Springer
13 years 7 months ago
A visibility algorithm for hybrid geometry- and image-based modeling and rendering
Hybrid geometry- and image-based modeling and rendering systems use photographs taken of a real-world environment and mapped onto the surfaces of a 3D model to achieve photorealis...
Thomas A. Funkhouser