Sciweavers

348 search results - page 44 / 70
» di 2008
Sort
View
TIP
2002
94views more  TIP 2002»
13 years 7 months ago
Denoising and copy attacks resilient watermarking by exploiting prior knowledge at detector
Watermarkingwith both obliviousdetection and high robustness capabilities is still a challenging problem. The existing methods are either robust or oblivious, but it is di cult to...
Chun-Shien Lu, Hong-Yuan Mark Liao, Martin Kutter
DELTA
2008
IEEE
14 years 2 months ago
An Integrated Validation Environment for Differential Power Analysis
Integrated systems represent the most common solution for storage and transmission of confidential data. However, cryptographic devices can be subject to passive attacks that cons...
Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouze...
ECAI
2008
Springer
13 years 9 months ago
Partial and Informative Common Subsumers in Description Logics
Least Common Subsumers in Description Logics have shown their usefulness for discovering commonalities among all concepts of a collection. Several applications are nevertheless foc...
Simona Colucci, Eugenio Di Sciascio, Francesco M. ...
CORR
2008
Springer
89views Education» more  CORR 2008»
13 years 7 months ago
On Endogenous Reconfiguration in Mobile Robotic Networks
: In this paper, our focus is on certain applications for mobile robotic networks, where reconfiguration is driven by factors intrinsic to the network rather than changes in the ex...
Ketan Savla, Emilio Frazzoli
VR
2008
IEEE
160views Virtual Reality» more  VR 2008»
14 years 2 months ago
Envisor: Online Environment Map Construction for Mixed Reality
One of the main goals of anywhere augmentation is the development of automatic algorithms for scene acquisition in augmented reality systems. In this paper, we present Envisor, a ...
Stephen DiVerdi, Jason Wither, Tobias Höllere...