Sciweavers

1898 search results - page 266 / 380
» Weak Keys for IDEA
Sort
View
IH
2001
Springer
14 years 2 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
VLDB
2001
ACM
121views Database» more  VLDB 2001»
14 years 2 months ago
Answering XML Queries on Heterogeneous Data Sources
ct Information Integration is among the most important fields in information management. The problem of integrating data from diverse, possibly heterogeneous data sources is ubiqu...
Ioana Manolescu, Daniela Florescu, Donald Kossmann
ICC
2000
IEEE
14 years 2 months ago
Reduced-State BCJR-Type Algorithms
—In this paper, we propose a technique to reduce the number of trellis states in BCJR-type algorithms, i.e., algorithms with a structure similar to that of the well-known algorit...
Giulio Colavolpe, Gian Luigi Ferrari, Riccardo Rah...
ICRA
2000
IEEE
111views Robotics» more  ICRA 2000»
14 years 2 months ago
Interpretation of Sewer Circular Structures
A practical algorithm for 3-D interpretation of images taken in a sewer by a robot-inspector is presented. Modern sewers made of concrete present regular circular structures origi...
Marina Kolesnik, Gregory Baratoff
INFOCOM
2000
IEEE
14 years 2 months ago
REUNITE: A Recursive Unicast Approach to Multicast
—We propose a new multicast protocol called REUNITE. The key idea of REUNITE is to use recursive unicast trees to implement multicast service. REUNITE does not use class D IP add...
Ion Stoica, T. S. Eugene Ng, Hui Zhang