Results 61 to 70 of about 42,016 (177)
ABSTRACT Tracing the early adoption of computer gang databases by the Los Angeles County Sheriff's Department and the Los Angeles Police Department in the 1980s to the deployment of computationally‐assisted surveillance during the Vietnam War, this paper uses a genealogical approach to compare surveillance technologies developed across the arc of ...
Christina Hughes
wiley +1 more source
A Novel Medical Image Watermarking in Three-dimensional Fourier Compressed Domain [PDF]
Digital watermarking is a research hotspot in the field of image security, which is protected digital image copyright. In order to ensure medical image information security, a novel medical image digital watermarking algorithm in three-dimensional ...
Baoru Han, Jingbing Li, Mengxing Huang
doaj
Strategic (Inconsistent) Disclosures and Sophisticated Investors: Evidence from Hedge Funds
ABSTRACT Recent SEC regulations require that qualified hedge fund advisers provide their investors with narrative disclosures of their business and operations. We find that 40% of these disclosures omit or de‐emphasize information regarding advisers' operational and investment risks when compared to other sources of public information. Funds with such “
YICHANG LIU +2 more
wiley +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
Asymmetric Watermarking Scheme Based on Correlation Testing
Asymmetric watermarking is the second generation of watermarking scheme which uses different keys for embedding and detecting watermark. Key for embedding is private or secret, but key for detecting can be available publicly and everyone who has the key ...
Rinaldi Munir +3 more
doaj +1 more source
Robust Watermarking using Hidden Markov Models [PDF]
Software piracy is the unauthorized copying or distribution of software. It is a growing problem that results in annual losses in the billions of dollars.
Mungale, Mausami
core +1 more source
Automation and Augmentation in Theological Perspective
Abstract AI enables forms of automation that threaten unemployment and deskilling, eliminating important opportunities for the development of virtue. The concomitant loss of virtue and meaningful employment makes it a theological problem from the perspective of Catholic social teaching and theological anthropology.
Paul Scherz
wiley +1 more source
Robust Dual-Color Watermarking Based on Quaternion Singular Value Decomposition
This paper proposes a robust dual-color watermarking based on quaternion singular value decomposition (QSVD), which can embed large payloads into color images with low distortion, and can obtain strong robustness to process color image in a holistic ...
Yong Chen +3 more
doaj +1 more source
Xml Streams Watermarking [PDF]
XML streams are valuable, continuous, high-throughput sources of information whose owners must be protected against illegal redistributions. Watermarking is a known technique for hiding copyrights marks within documents, thus preventing redistributions.
Lafaye, Julien, Gross-Amblard, David
openaire +3 more sources
ABSTRACT Between 1889 and 1914, the international peace movement and the labor movement shared goals of preventing war and promoting justice, but their collaboration was constrained by differing class compositions and priorities. While the peace movement, led largely by middle‐class reformers, emphasized arbitration and disarmament, the labor movement,
Fredrik Egefur
wiley +1 more source

