-
3
-
-
14844326110
-
Natural Language Watermarking and Tamperproofing
-
Florida, USA
-
M. Atallah, V. Raskin, C. Hempelman, M. Karahan, R. Sion, K. Triezenberg, and U. Topkara. Natural Language Watermarking and Tamperproofing. In Proceedings of the Fifth International Information Hiding Workshop, Florida, USA, 2002.
-
(2002)
Proceedings of the Fifth International Information Hiding Workshop
-
-
Atallah, M.1
Raskin, V.2
Hempelman, C.3
Karahan, M.4
Sion, R.5
Triezenberg, K.6
Topkara, U.7
-
4
-
-
0002525028
-
Evolutionary Operation: A Method for Increasing Industrial Productivity
-
G. Box. Evolutionary Operation: A Method for Increasing Industrial Productivity. Applied Statistics, 6(2):81-101, 1957.
-
(1957)
Applied Statistics
, vol.6
, Issue.2
, pp. 81-101
-
-
Box, G.1
-
9
-
-
2442576133
-
On the Local Convergence of Pattern Search
-
E. Dolan, R. Lewis, and V. Torczon. On the Local Convergence of Pattern Search. SIAM Journal on Optimization, 14(2):567-583, 2003.
-
(2003)
SIAM Journal on Optimization
, vol.14
, Issue.2
, pp. 567-583
-
-
Dolan, E.1
Lewis, R.2
Torczon, V.3
-
12
-
-
0032634857
-
Multimedia Watermarking Techniques
-
July
-
F. Hartung and M.Kutter. Multimedia Watermarking Techniques. Proceedings of the IEEE, 87(7):1079-1107, July 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
15
-
-
0034266804
-
Watermarking Digital Image and Video Data: A State-of-the-Art Overview
-
September
-
G. Langelaar, I. Setyawan, and R. Lagendijk. Watermarking Digital Image and Video Data: A State-of-the-Art Overview. IEEE Signal Processing Magazine, 17(5):20-46, September 2000.
-
(2000)
IEEE Signal Processing Magazine
, vol.17
, Issue.5
, pp. 20-46
-
-
Langelaar, G.1
Setyawan, I.2
Lagendijk, R.3
-
16
-
-
0034412352
-
Pattern Search Methods for Linearly Constrained Minimization
-
R. Lewis and V. Torczon. Pattern Search Methods for Linearly Constrained Minimization. SIAM Journal on Optimization, 10(3):917-941, 2000.
-
(2000)
SIAM Journal on Optimization
, vol.10
, Issue.3
, pp. 917-941
-
-
Lewis, R.1
Torczon, V.2
-
18
-
-
19944413957
-
Fingerprinting Relational Databases: Schemes and Specialties
-
34-45, Jan-Mar
-
Y. Li, V. Swamp, and S. Jajodia. Fingerprinting Relational Databases: Schemes and Specialties. IEEE Transactions on Dependable and Secure Computing, 02(1):34-45, Jan-Mar 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.1
-
-
Li, Y.1
Swamp, V.2
Jajodia, S.3
-
24
-
-
0032095654
-
Multimedia DataEmbedding and Watermarking Technologies
-
June
-
M. Swanson, M. Kobayashi, and A. Tewfik. Multimedia DataEmbedding and Watermarking Technologies. Proceedings of the IEEE, 86:1064-1087, June 1998.
-
(1998)
Proceedings of the IEEE
, vol.86
, pp. 1064-1087
-
-
Swanson, M.1
Kobayashi, M.2
Tewfik, A.3
-
26
-
-
0032664574
-
Perceptual Watermarks for Digital Images and Video
-
July
-
R. Wolfgang, C. Podilchuk, and E. Delp. Perceptual Watermarks for Digital Images and Video. Proceedings of the IEEE, 87:1108-1126, July 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, pp. 1108-1126
-
-
Wolfgang, R.1
Podilchuk, C.2
Delp, E.3
|