Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Jae-Min Seol"'
Publikováno v:
PLoS Biology, Vol 20, Iss 1, p e3001546 (2022)
The subiculum is positioned at a critical juncture at the interface of the hippocampus with the rest of the brain. However, the exact roles of the subiculum in most hippocampal-dependent memory tasks remain largely unknown. One obstacle to make compa
Externí odkaz:
https://doaj.org/article/af251994cd9e4402b718e117bc0650c6
The subiculum is positioned at a critical juncture at the interface of the hippocampus with the rest of the brain. However, the exact roles of the subiculum in most hippocampal-dependent memory tasks remain largely unknown. One obstacle to make analy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::43af627be047dd6efbe1e2ba6e7879d8
https://doi.org/10.1101/2021.08.11.456028
https://doi.org/10.1101/2021.08.11.456028
Autor:
Jae Min Seol, Seong Whan Kim
Publikováno v:
The KIPS Transactions:PartD. :713-720
Fingerprinting scheme uses digital watermarks to trace originator of unauthorized or pirated copies, however, multiple users may collude and escape identification by creating an average or median of their individually watermarked copies. Previous res
Autor:
Seong-Whan Kim, Jae-Min Seol
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540895237
ICOIN
ICOIN
RFID (RF based identification system) requires identification and collision avoidance schemes for tag singularization. To avoid the collision, there are two previous approaches: ALOHA based and binary tree algorithm.. They are essentially collision a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b1a21c1c962862da332e88558d1c89ca
https://doi.org/10.1007/978-3-540-89524-4_51
https://doi.org/10.1007/978-3-540-89524-4_51
Autor:
Jae-Min Seol, Seong-Whan Kim
Publikováno v:
CIT
Digital fingerprinting is a technique to prevent customers from redistributing multimedia contents illegally. Main attack for fingerprinting is the collusion attack, where multiple users collude by creating a mix (e.g. average or median) of their ind
Autor:
Seong-Whan Kim, Jae-Min Seol
Publikováno v:
Information Hiding ISBN: 9783540741237
Information Hiding
Information Hiding
Digital fingerprinting is a technique to prevent customers from redistributing multimedia contents illegally. Main attack for fingerprinting is the collusion attack, where multiple users collude by creating an average or median of their individual fi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::51941fc7bf0a71eb37dfa91d061f3d85
https://doi.org/10.1007/978-3-540-74124-4_22
https://doi.org/10.1007/978-3-540-74124-4_22
Autor:
Jae-Min Seol, Seong-Whan Kim
Publikováno v:
Computational Intelligence and Security ISBN: 9783540743767
CIS
CIS
RFID (radio frequency identification) is a RF based identification system, where RF reader reads (and writes) data from each entity (RF tag). Upon request from reader, tags in reader's accessible RF range will respond, and if the number of tags is la
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0b775e72fd3305551ac92d38149e8f54
https://doi.org/10.1007/978-3-540-74377-4_76
https://doi.org/10.1007/978-3-540-74377-4_76
Autor:
Jae-min Seol, Seong-whan Kim
Publikováno v:
CIT
RFID (radio frequency identification) is a RF based identification system, where RF reader reads (and writes) data from each entity (RF tag). Upon request from reader, tags in reader?s accessible RF range will respond, and if the number of tags is la
Autor:
Seong-Whan Kim, Jae-Min Seol
Publikováno v:
Embedded and Ubiquitous Computing ISBN: 9783540366799
EUC
EUC
Fingerprinting schemes use digital watermarks to determine originators of unauthorized/pirated copies. Multiple users may collude and collectively escape identification by creating an average or median of their individually watermarked copies. Previo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e917d2e9dd20325c793e464dfcb1bf44
https://doi.org/10.1007/11802167_57
https://doi.org/10.1007/11802167_57
Autor:
Seong-whan Kim, Jae-min Seol
Publikováno v:
Visual Communications and Image Processing 2005.
Fingerprinting schemes use digital watermarks to determine originators of unauthorized/pirated copies. Multiple users may collude and collectively escape identification by creating an average or median of their individually watermarked copies. We pre