Sciweavers

1153 search results - page 146 / 231
» Reversing graph transformations
Sort
View
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
14 years 4 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran
DNIS
2007
Springer
103views Database» more  DNIS 2007»
14 years 4 months ago
A Formalism for Navigating and Editing XML Document Structure
The use of XML has become pervasive. It is used in a range of data storage and data exchange applications. In many cases such XML data is captured from users via forms or transform...
Frithjof Dau, Mark Sifer
TIME
2005
IEEE
14 years 3 months ago
Exploiting the Relationship between IA Networks and Finite Domain CSPs
We exploit the fact that qualitative Interval Algebra (IA) network problems are finite domain CSPs. In the first part of the paper, we show how to convert a qualitative IA network ...
André Trudel, Haiyi Zhang
WCRE
2005
IEEE
14 years 3 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean
GPCE
2005
Springer
14 years 3 months ago
Object-Oriented Reengineering Patterns - An Overview
Successful software systems must be prepared to evolve or they will die. Although object-oriented software systems are built to last, over time they degrade as much as any legacy s...
Oscar Nierstrasz, Stéphane Ducasse, Serge D...