-
1
-
-
0033872896
-
RADAR: An In-building RF-based User Location and Tracking System
-
P. Bahl and V. N. Padmanabhan, RADAR: An In-building RF-based User Location and Tracking System, IEEE INFOCOM, 2000, Vol. 2, pp. 775-84.
-
(2000)
IEEE INFOCOM
, vol.2
, pp. 775-784
-
-
Bahl, P.1
Padmanabhan, V.N.2
-
3
-
-
0242522422
-
The logical semantics of hypothetical rulebases with deletion
-
A.J. Bonner, The logical semantics of hypothetical rulebases with deletion, Journal of Logic Programming, 1995.
-
(1995)
Journal of Logic Programming
-
-
Bonner, A.J.1
-
4
-
-
0032637701
-
-
IEEE, July
-
J. Brassil, S, Low and N. Maxemchuk, Copyright Protection for the Electronic Distribution of Text Documents, IEEE, July 1999, Vol. 87, n. 7. pp. 1181-1196.
-
(1999)
Copyright Protection for the Electronic Distribution of Text Documents
, vol.87
, Issue.7
, pp. 1181-1196
-
-
Brassil, J.1
Low, S.2
Maxemchuk, N.3
-
5
-
-
85029603847
-
Software Develpment Effort: Ada Vs Other Higher Order Languages
-
Sep.
-
N.J. Breanner, Software Develpment Effort: Ada Vs Other Higher Order Languages, The DoD Cost Analysis Symposium, Sep 1991.
-
(1991)
The DoD Cost Analysis Symposium
-
-
Breanner, N.J.1
-
7
-
-
33645628793
-
Self-configuring Localization Systems: Design and Experimental Evaluation
-
August
-
N. Bulusu, J. Heidemann, T. Tran, Self-configuring Localization Systems: Design and Experimental Evaluation, ACM TECS, August 2002.
-
(2002)
ACM TECS
-
-
Bulusu, N.1
Heidemann, J.2
Tran, T.3
-
8
-
-
0032657626
-
Effective Iterative Techniques for Fingerprinting Design IP
-
A. E. Caldwell, H. Choi, A.B. Kahng, S. Mantik, M. Potkonjak, G. Qu and J. L. Wong, Effective iterative techniques for fingerprinting design IP, Design Automation Conference, 1999, pp. 843-848.
-
(1999)
Design Automation Conference
, pp. 843-848
-
-
Caldwell, A.E.1
Choi, H.2
Kahng, A.B.3
Mantik, S.4
Potkonjak, M.5
Qu, G.6
Wong, J.L.7
-
10
-
-
84943340146
-
Embedding the Internet
-
May
-
D. Estrin, R. Govindan, J. Heidemann, Embedding the Internet, Communications of the ACM, May 2000, Vol. 43, pp. 38-41.
-
(2000)
Communications of the ACM
, vol.43
, pp. 38-41
-
-
Estrin, D.1
Govindan, R.2
Heidemann, J.3
-
11
-
-
0003169484
-
Theoria combinations obsevationum erroribus minimis obnoxiae
-
C. F. Gauss, Theoria combinations obsevationum erroribus minimis obnoxiae, Werke, Bd.4, 1810, pp.1.
-
(1810)
Werke
, vol.4
, pp. 1
-
-
Gauss, C.F.1
-
13
-
-
0032634857
-
-
IEEE, June
-
F. Hartung and M. Kutter, Multimedia watermarking techniques, IEEE, June 1999, Vol. 87, n.7, pp. 1079-1107.
-
(1999)
Multimedia Watermarking Techniques
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
14
-
-
0004415562
-
-
UW CSE 2000-02-02, Univ. Washington, Seattle, Feb.
-
J. Hightower, R. Want and G. Borriello, SpotON: An Indoor 3d Location Sensing Technology Based on RF Signal Strength, UW CSE 2000-02-02, Univ. Washington, Seattle, Feb 2000.
-
(2000)
SpotON: An Indoor 3d Location Sensing Technology Based on RF Signal Strength
-
-
Hightower, J.1
Want, R.2
Borriello, G.3
-
15
-
-
0031623974
-
Techniques for Intellectual Property Protection of DSP Designs
-
I. Hong, M. Potkonjak, Techniques for Intellectual Property Protection of DSP Designs, 1998 IEEE ICASSP 1998, Vol.5, pp. 3133-3136.
-
(1998)
1998 IEEE ICASSP
, vol.5
, pp. 3133-3136
-
-
Hong, I.1
Potkonjak, M.2
-
18
-
-
0032320166
-
Intellectual Property Protection by Watermarking Combinational Logic Synthesis Solutions
-
D. Kirovski, Y.Y. Hwang, M. Potkonjak, and J. Cong, Intellectual Property Protection by Watermarking Combinational Logic Synthesis Solutions, IEEE/ACM International Conference on Computer-Aided Design. Digest of Technical Papers, 1998, pp. 194-8.
-
(1998)
IEEE/ACM International Conference on Computer-aided Design. Digest of Technical Papers
, pp. 194-198
-
-
Kirovski, D.1
Hwang, Y.Y.2
Potkonjak, M.3
Cong, J.4
-
19
-
-
0033713447
-
Forensic Engineering Techniques for VLSI CAD Tools
-
D. Kirovski, David Liu, Jennifer Wong, and M. Potkonjak, Forensic Engineering Techniques for VLSI CAD Tools, ACM-IEEE Design Automation Conference, 2000.
-
(2000)
ACM-IEEE Design Automation Conference
-
-
Kirovski, D.1
Liu, D.2
Wong, J.3
Potkonjak, M.4
-
20
-
-
0004118156
-
Global Error-Tolerant Fault-Tolerant Algorithms for Location Discovery in Ad-hoc Wireless Networks
-
UCLA Computer Science Department
-
F. Koushanfar, et al. Global Error-Tolerant Fault-Tolerant Algorithms for Location Discovery in Ad-hoc Wireless Networks, UCLA Technical Report, UCLA Computer Science Department, 2001.
-
(2001)
UCLA Technical Report
-
-
Koushanfar, F.1
-
21
-
-
0035473102
-
Fingerprinting Techniques for Field-programmable Gate Array Intellectual Property Protection
-
Oct.
-
J. Lach, W.H. Mangione-Smith, M. Potkonjak, Fingerprinting Techniques for Field-programmable Gate Array Intellectual Property Protection, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Oct. 2001, Vol.20, n.10, pp. 1253-61.
-
(2001)
IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems
, vol.20
, Issue.10
, pp. 1253-1261
-
-
Lach, J.1
Mangione-Smith, W.H.2
Potkonjak, M.3
-
23
-
-
84949509764
-
Experience With Software Watermarking
-
th Annual Computer Security Applications Conference, ACSAC 2000, pp. 308-316.
-
(2000)
th Annual Computer Security Applications Conference, ACSAC
, pp. 308-316
-
-
Palsberg, J.1
Krishnaswamy, S.2
Minseok, K.3
Ma, D.4
Shao, Q.5
Zhang, Y.6
-
26
-
-
0033713161
-
Fingerprinting Intellectual Property Using Constraint-addition
-
G. Qu and M. Potkonjak, Fingerprinting Intellectual Property Using Constraint-addition, Design Automation Conference, 2000, pp. 587-592.
-
(2000)
Design Automation Conference
, pp. 587-592
-
-
Qu, G.1
Potkonjak, M.2
-
27
-
-
0001847463
-
Fair Watermarking Techniques
-
G. Qu, J.L. Wong, and M. Potkonjak, Fair Watermarking Techniques, IEEE/ACM Asia and South Pacific Design Automation Conference, 2000, pp. 55-60.
-
(2000)
IEEE/ACM Asia and South Pacific Design Automation Conference
, pp. 55-60
-
-
Qu, G.1
Wong, J.L.2
Potkonjak, M.3
-
28
-
-
0034854451
-
Locationing in Distributed Ad-Hoc Wireless Sensor Networks
-
C. Savarese, J. M. Rabaey and J. Beutel, Locationing In Distributed Ad-Hoc Wireless Sensor Networks, ICASSP, 2001, Vol.4, pp. 2037-2040.
-
(2001)
ICASSP
, vol.4
, pp. 2037-2040
-
-
Savarese, C.1
Rabaey, J.M.2
Beutel, J.3
-
31
-
-
0033601676
-
Blind Digital Watermarking for Cartoon and Map Images
-
P. Su, J. Kuo, C.-C, H.M. Wang, Blind Digital Watermarking for Cartoon and Map Images, SPIE - The International Society for Optical Engineering, 1999, Vol.3657, pp. 296-306.
-
(1999)
SPIE - The International Society for Optical Engineering
, vol.3657
, pp. 296-306
-
-
Su, P.1
Kuo, J.2
Wang, H.M.3
-
32
-
-
0348193012
-
Proactive Computing
-
May
-
D. Tennenhouse, Proactive Computing, Communications of the ACM, May 2000, Vol. 43, n. 5, pp. 43-50.
-
(2000)
Communications of the ACM
, vol.43
, Issue.5
, pp. 43-50
-
-
Tennenhouse, D.1
-
34
-
-
0030386584
-
Applications of Toral Automorphisms in Image Watermarking
-
Voy96
-
Voy96 G. Voyatzis and I. Pitas, Applications of Toral Automorphisms In Image Watermarking, ICIP 1996, Vol II. pp. 237-240.
-
(1996)
ICIP
, vol.2
, pp. 237-240
-
-
Voyatzis, G.1
Pitas, I.2
-
35
-
-
0026817980
-
Active Badges and Personal Interactive Computing Objects
-
Feb
-
R. Want, A. Hopper, Active Badges And Personal Interactive Computing Objects, IEEE Transactions on Consumer Electronics, Feb 1992, Vol. 38, n. 1, pp. 10-20.
-
(1992)
IEEE Transactions on Consumer Electronics
, vol.38
, Issue.1
, pp. 10-20
-
-
Want, R.1
Hopper, A.2
-
37
-
-
0032664574
-
Perceptual Watermarks for Digital Images and Video
-
IEEE, Special Issue on
-
R. Wolfgang, C. Podilchuk and E. Delp, Perceptual Watermarks for Digital Images and Video, IEEE, Special Issue on Identification and Protection of Multimedia Information, July 1999, Vol. 87, no.7, pp. 1108-1126.
-
(1999)
Identification and Protection of Multimedia Information
, vol.87
, Issue.7
, pp. 1108-1126
-
-
Wolfgang, R.1
Podilchuk, C.2
Delp, E.3
|