Sciweavers

348 search results - page 33 / 70
» Technologies for families
Sort
View
MUE
2008
IEEE
143views Multimedia» more  MUE 2008»
14 years 2 months ago
A Robust Watermark Scheme for Copyright Protection
In this paper, we propose a robust watermark technology that can be used to protect copyright. We enhance robustness of the watermark such that it can be used to protect the intel...
Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Ya...
ISCAS
2006
IEEE
103views Hardware» more  ISCAS 2006»
14 years 2 months ago
A low-power geometric mapping co-processor for high-speed graphics application
Abstract— In this article we present a novel design of a lowpower geometric mapping co-processor that can be used for high-performance graphics system. The processor can carry ou...
S. Leeke, L. Maharatna
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
14 years 2 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
ISORC
2005
IEEE
14 years 2 months ago
Revisiting COTS middleware for DRE systems
Distributed Real-Time Embedded systems (DRE) increasingly rely on COTS middleware to meet their distribution needs. Yet, there is a technology gap between the design of COTS middl...
Jérôme Hugues, Laurent Pautet, Fabric...
IDA
2005
Springer
14 years 2 months ago
Combining Bayesian Networks with Higher-Order Data Representations
Abstract. This paper introduces Higher-Order Bayesian Networks, a probabilistic reasoning formalism which combines the efficient reasoning mechanisms of Bayesian Networks with the...
Elias Gyftodimos, Peter A. Flach