Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
ct Information Integration is among the most important fields in information management. The problem of integrating data from diverse, possibly heterogeneous data sources is ubiqu...
Ioana Manolescu, Daniela Florescu, Donald Kossmann
—In this paper, we propose a technique to reduce the number of trellis states in BCJR-type algorithms, i.e., algorithms with a structure similar to that of the well-known algorit...
Giulio Colavolpe, Gian Luigi Ferrari, Riccardo Rah...
A practical algorithm for 3-D interpretation of images taken in a sewer by a robot-inspector is presented. Modern sewers made of concrete present regular circular structures origi...
—We propose a new multicast protocol called REUNITE. The key idea of REUNITE is to use recursive unicast trees to implement multicast service. REUNITE does not use class D IP add...