Listing 1 - 3 of 3 |
Sort by
|
Choose an application
This unique easy-to-use software is an integration of tools and simulators that help you solve the most common feedforward predistorted amplifier design equations, including calculating gain and loop balance, optimum coupling ratios, and more. It includes the tools you need everyday, such as a microstrip calculator and parallel coupler designer, to relieve you of lengthy calculations and help you predict the performance of a complex amplifier before all the blocks are together.
Computer security. --- Digital watermarking. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Watermarking, Digital --- Image steganography --- Watermarks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Computer security. --- Digital watermarking. --- Data protection. --- 681.3*E4 --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Watermarking, Digital --- Data encryption (Computer science) --- Watermarks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- 681.3*E4 Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- Security measures --- Cyber security --- Cybersecurity --- Digital watermarking --- Sécurité informatique --- Filigranes numériques --- Protection de l'information (Informatique) --- Protection of computer systems --- Protection --- Computer security --- Image steganography
Choose an application
The 1st International Workshop on Digital Watermarking (IWDW), the conference covering all aspects of digital watermarking, was held at the Hotel Riviera situated along the beautiful Han River in Seoul, Korea from November 21 to 22, 2002. These proceedings contain 21 papers that were accepted for presentation at the conference. These papers were selected from 67 submissions including 3 invited papers. They went through a thorough review process by the Program Committee and were selected on the basis of excellence and novelty. The following is a brief description of the history of this conference and - viewing process: In August 2001 some members of the Special Interest Group on Multimedia Protection (SIGMP) of the Korea Institute of Information Security and Cryptology (KIISC) agreed to create the IWDW. In November 2001 we set up a Program Committee and solicited papers while asking Springer-Verlag to publish the proceedings of the workshop in their Lecture Notes in Computer Science series. In July 2002 we received 64 submissions from 14 countries using Microsoft’s conference management site (http://cmt. research. microsoft. com/ iwdw2002/). Each submission was assigned a number automatically by the conference management tool and the paper was sent to the Program Committee members for their review. We also encouraged different sets of experts to join for fair reviews.
Computer security --- Data protection --- Digital watermarking --- Computer Science --- Engineering & Applied Sciences --- Watermarking, Digital --- Computer science. --- Data encryption (Computer science). --- Multimedia information systems. --- Text processing (Computer science). --- Image processing. --- Computers and civilization. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computers and Society. --- Multimedia Information Systems. --- Document Preparation and Text Processing. --- Image Processing and Computer Vision. --- Management of Computing and Information Systems. --- Image steganography --- Watermarks --- Multimedia systems. --- Natural language processing (Computer science). --- Computer vision. --- Information Systems. --- Cryptology. --- Natural Language Processing (NLP). --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- NLP (Computer science) --- Electronic data processing --- Human-computer interaction --- Semantic computing --- Computer-based multimedia information systems --- Multimedia computing --- Multimedia information systems --- Multimedia knowledge systems --- Information storage and retrieval systems --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Optical data processing. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Computers --- Civilization and computers --- Civilization --- Communication systems --- Optical equipment --- Data encryption (Computer science) --- Natural language processing (Computer science)
Listing 1 - 3 of 3 |
Sort by
|