迁移 发表于 2025-3-28 15:29:38

http://reply.papertrans.cn/47/4658/465790/465790_41.png

星星 发表于 2025-3-28 19:28:02

1865-0929 Overview: up-to-date results.fast track conference proceedings.state-of-the-art report978-3-642-15765-3978-3-642-15766-0Series ISSN 1865-0929 Series E-ISSN 1865-0937

除草剂 发表于 2025-3-29 01:34:41

https://doi.org/10.1007/978-3-642-15766-0IEEE 802; 16; Information Retrieval; Management; Multimedia; Performance; algorithms; classification; data m

过多 发表于 2025-3-29 03:59:10

Network Forensic Analysis by Correlation of Attacks with Network Attributesm incidents. We extend our previously proposed model for collecting network data, identifying suspicious packets, examining protocol features misused and correlating attack attributes. This model is capable of handling attacks on the TCP/IP suite. The results obtained by this model are validated.

Climate 发表于 2025-3-29 09:05:35

http://reply.papertrans.cn/47/4658/465790/465790_45.png

颂扬本人 发表于 2025-3-29 13:28:38

http://reply.papertrans.cn/47/4658/465790/465790_46.png

Inkling 发表于 2025-3-29 19:18:11

A Novel High Speed Dynamic Comparator Using Positive Feedback with Low Power Dissipation and Low Offparator such that near equal current distribution in the input transistors can be achieved for a meta-stable point of the comparator. Restricted signal swing clock for the tail current is also used to ensure constant currents in the differential pairs.

Flatus 发表于 2025-3-29 22:00:05

A New Image Content-Based Authenticity Verification Procedure for Wireless Image Authentication Scheauthentication results with low computational cost and high performance by comparing with existing content-based authentication procedure. The proposed scheme implemented the existing methods like secret wavelet filter parameterization, wireless image authentication and structural digital signature.

代理人 发表于 2025-3-30 03:02:02

http://reply.papertrans.cn/47/4658/465790/465790_49.png

Jacket 发表于 2025-3-30 07:35:32

Protecting Digital Images Using DTCWT-DCT embedding and extracting the watermark. This paper compares various watermarking algorithms like DCT, Discrete Wavelet Transform (DWT), DTCWT, DCT-DWT with DTCWT-DCT method. This hybrid DTCWT-DCT shows superior performance in the presence of geometric and signal processing operations.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information and Communication Technologies; International Confer Vinu V Das,R. Vijaykumar Conference proceedings 2010 Springer-Verlag Berli