Sciweavers

392 search results - page 54 / 79
» Reversal Complexity Revisited
Sort
View
ICASSP
2008
IEEE
14 years 3 months ago
An invertible quantization based watermarking approach
In this paper a new class of invertible watermarking approach based on quantization has been introduced. Based on the necessary conditions (blindness, reversibility and impercepti...
Mohammad Javad Saberian, Mohammad Ali Akhaee, Faro...
WCRE
2008
IEEE
14 years 3 months ago
Analyzing the Actual Execution of a Large Software-Intensive System for Determining Dependencies
In this paper, we present a dynamic analysis approach to increase the understandability of a large softwareintensive system, more particularly to enable the identification of depe...
Trosky Boris Callo Arias, Paris Avgeriou, Pierre A...
AINA
2007
IEEE
14 years 3 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
IWPC
2007
IEEE
14 years 2 months ago
Metrics for Measuring the Effectiveness of Decompilers and Obfuscators
Java developers often use decompilers to aid reverse engineering and obfuscators to prevent it. Decompilers translate low-level class files to Java source and can produce “good...
Nomair A. Naeem, Michael Batchelder, Laurie J. Hen...
PCM
2004
Springer
103views Multimedia» more  PCM 2004»
14 years 2 months ago
Spectral Coding of Three-Dimensional Mesh Geometry Information Using Dual Graph
In this paper, we propose a new scheme for the geometry coding of three-dimensional (3-D) mesh models using a dual graph. In order to compress the mesh geometry information, we gen...
Sung-Yeol Kim, Seung-Uk Yoon, Yo-Sung Ho