Sciweavers

234 search results - page 4 / 47
» Looks good to me
Sort
View
MMSEC
2006
ACM
167views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Hermite polynomials as provably good functions to watermark white gaussian hosts
In the watermark detection scenario, also known as zero-bit watermarking, a watermark, carrying no hidden message, is inserted in content. The watermark detector checks for the pr...
Teddy Furon
CORR
2008
Springer
76views Education» more  CORR 2008»
13 years 7 months ago
The Good, the Bad, and the Ugly: three different approaches to break their watermarking system
The Good is Blondie, a wandering gunman with a strong personal sense of honor. The Bad is Angel Eyes, a sadistic hitman who always hits his mark. The Ugly is Tuco, a Mexican bandi...
Gaëtan Le Guelvouit, Teddy Furon, Franç...
CEJCS
2011
78views more  CEJCS 2011»
12 years 7 months ago
Good versus optimal: Why network analytic methods need more systematic evaluation
: Network analytic method designed for the analysis of static networks promise to identify significant relational patterns that correlate with important structures in the complex ...
Katharina Anna Zweig
WDAG
2010
Springer
164views Algorithms» more  WDAG 2010»
13 years 5 months ago
It's on Me! The Benefit of Altruism in BAR Environments
Abstract. Cooperation, a necessity for any peer-to-peer (P2P) cooperative service, is often achieved by rewarding good behavior now with the promise of future benefits. However, in...
Edmund L. Wong, Joshua B. Leners, Lorenzo Alvisi
CHI
2009
ACM
14 years 8 months ago
Feed me: motivating newcomer contribution in social network sites
Social networking sites (SNS) are only as good as the content their users share. Therefore, designers of SNS seek to improve the overall user experience by encouraging members to ...
Moira Burke, Cameron Marlow, Thomas M. Lento