Listing 1 - 10 of 20 | << page >> |
Sort by
|
Choose an application
Italian language --- Italian language --- Study and teaching --- Foreign speakers --- Study and teaching --- Evaluation
Choose an application
Data encryption (Computer science). --- Management information systems. --- Computer science. --- Computers and civilization. --- Application software. --- Multimedia information systems. --- Computer communication systems. --- Cryptology. --- Management of Computing and Information Systems. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Multimedia Information Systems. --- Computer Communication Networks. --- Computer security --- Data protection --- Digital watermarking --- Data encryption (Computer science)
Choose an application
Data encryption (Computer science). --- Management information systems. --- Computer science. --- Computers and civilization. --- Application software. --- Multimedia information systems. --- Computer communication systems. --- Cryptology. --- Management of Computing and Information Systems. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Multimedia Information Systems. --- Computer Communication Networks. --- Computer security --- Data protection --- Digital watermarking --- Data encryption (Computer science)
Choose an application
Choose an application
Data encryption (Computer science). --- Management information systems. --- Computer science. --- Computers and civilization. --- Application software. --- Multimedia information systems. --- Computer communication systems. --- Cryptology. --- Management of Computing and Information Systems. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Multimedia Information Systems. --- Computer Communication Networks. --- Computer security --- Data protection --- Digital watermarking --- Data encryption (Computer science)
Choose an application
We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). Watermarking continues to generate strong academic interest. Commercialization of the technology is proceeding at a steadypace. We haveseen watermarkingadoptedfor DVD audio.Fingerpri- ing technology was successfully used to determine the source of pirated video material. Furthermore, a number of companies are using watermarking as an enabling technology for broadcast monitoring services. Watermarking of digital cinema contentis anticipated. Future applications may also come from areas- related to digital rights management. For example, the use of watermarking to enhance legacy broadcast and communication systems is now being considered. IWDW 2005 o?ers an opportunity to re?ect upon the state of the art in digital watermarking as well as discuss directions for future research and applications. This year we accepted 31 papers from 74 submissions. This 42% acceptance rate indicates our commitment to ensuring a very high quality conference. We thankthemembersoftheTechnicalProgramCommitteeformakingthispossible by their timely and insightful reviews. Thanks to their hard work this is the ?rst IWDW at which the ?nal proceedings are available to the participants at the time of the workshop as a Springer LNCS publication.
Data encryption (Computer science). --- Operating systems (Computers). --- Algorithms. --- Multimedia information systems. --- Computers and civilization. --- Management information systems. --- Computer science. --- Cryptology. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Multimedia Information Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer security --- Data protection --- Digital watermarking
Choose an application
We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). Watermarking continues to generate strong academic interest. Commercialization of the technology is proceeding at a steadypace. We haveseen watermarkingadoptedfor DVD audio.Fingerpri- ing technology was successfully used to determine the source of pirated video material. Furthermore, a number of companies are using watermarking as an enabling technology for broadcast monitoring services. Watermarking of digital cinema contentis anticipated. Future applications may also come from areas- related to digital rights management. For example, the use of watermarking to enhance legacy broadcast and communication systems is now being considered. IWDW 2005 o?ers an opportunity to re?ect upon the state of the art in digital watermarking as well as discuss directions for future research and applications. This year we accepted 31 papers from 74 submissions. This 42% acceptance rate indicates our commitment to ensuring a very high quality conference. We thankthemembersoftheTechnicalProgramCommitteeformakingthispossible by their timely and insightful reviews. Thanks to their hard work this is the ?rst IWDW at which the ?nal proceedings are available to the participants at the time of the workshop as a Springer LNCS publication.
Data encryption (Computer science). --- Operating systems (Computers). --- Algorithms. --- Multimedia information systems. --- Computers and civilization. --- Management information systems. --- Computer science. --- Cryptology. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Multimedia Information Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer security --- Data protection --- Digital watermarking
Choose an application
We are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). Watermarking continues to generate strong academic interest. Commercialization of the technology is proceeding at a steadypace. We haveseen watermarkingadoptedfor DVD audio.Fingerpri- ing technology was successfully used to determine the source of pirated video material. Furthermore, a number of companies are using watermarking as an enabling technology for broadcast monitoring services. Watermarking of digital cinema contentis anticipated. Future applications may also come from areas- related to digital rights management. For example, the use of watermarking to enhance legacy broadcast and communication systems is now being considered. IWDW 2005 o?ers an opportunity to re?ect upon the state of the art in digital watermarking as well as discuss directions for future research and applications. This year we accepted 31 papers from 74 submissions. This 42% acceptance rate indicates our commitment to ensuring a very high quality conference. We thankthemembersoftheTechnicalProgramCommitteeformakingthispossible by their timely and insightful reviews. Thanks to their hard work this is the ?rst IWDW at which the ?nal proceedings are available to the participants at the time of the workshop as a Springer LNCS publication.
Data encryption (Computer science). --- Operating systems (Computers). --- Algorithms. --- Multimedia information systems. --- Computers and civilization. --- Management information systems. --- Computer science. --- Cryptology. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Multimedia Information Systems. --- Computers and Society. --- Management of Computing and Information Systems. --- Computer security --- Data protection --- Digital watermarking
Choose an application
This book reviews the most powerful attack strategies and potential defense mechanisms, always approaching the interplay between the Fusion Center and the Byzantines from a game-theoretic perspective. For each of the settings considered, the equilibria of the game and the corresponding payoffs are derived, shedding new light on the achievable performance level and the impact that the presence of the Byzantines has on the accuracy of decisions made by the Fusion Center. Accordingly, the book offers a simple yet effective introduction to the emerging field of adversarial information fusion, providing a wealth of intuitive take-home lessons for practitioners interested in applying the most basic notions to the design of practical systems, while at the same time introducing researchers and other readers to the mathematical details behind the theory.
Signal processing. --- Image processing. --- Speech processing systems. --- Computer security. --- System safety. --- Signal, Image and Speech Processing. --- Systems and Data Security. --- Security Science and Technology. --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computational linguistics --- Electronic systems --- Information theory --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication) --- Prevention --- Protection --- Security measures --- Sensor networks. --- Networks, Sensor --- Detectors --- Context-aware computing --- Multisensor data fusion
Choose an application
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- complexe analyse (wiskunde) --- informatica --- maatschappij --- multimedia --- informatica management --- OS (operating system)
Listing 1 - 10 of 20 | << page >> |
Sort by
|