![]() ![]() ![]() | ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Note: Links lead to the DBLP on the Web. Ee-Chien Chang Pradeep K. Atrey , Wei-Qi Yan , Ee-Chien Chang, Mohan S. Kankanhalli : A Hierarchical Signature Scheme for Robust Video Authentication using Secret Sharing. MMM 2004 : 330-337 Sujoy Roy , Ee-Chien Chang: Watermarking with retrieval systems. Multimedia Syst. 9 (5): 433-440 (2004) Qiming Li , Ee-Chien Chang: Public Watermark Detection Using Multiple Proxies and Secret Sharing. IWDW 2003 : 558-569 Hang Yu , Ee-Chien Chang: Distributed multivariate regression based on influential observations. KDD 2003 : 679-684 Ee-Chien Chang, Chee Yap : Competitive On-Line Scheduling with Level of Service. J. Scheduling 6 (3): 251-267 (2003) Ee-Chien Chang, Mohan S. Kankanhalli , Xin Guan , Zhiyong Huang , Yinghui Wu : Robust image authentication using content based compression. Multimedia Syst. 9 (2): 121-130 (2003) Qiming Li , Ee-Chien Chang: Security of Public Watermarking Schemes for Binary Sequences. Information Hiding 2002 : 119-128 Ee-Chien Chang, Chee-Keng Yap : Competitive Online Scheduling with Level of Service. COCOON 2001 : 453-462 Ee-Chien Chang, Michael T. Orchard : Geometric Properties of Watermarking Schemes. ICIP 2000 Ee-Chien Chang, Chee-Keng Yap : A Simultaneous Search Problem. Algorithmica 26 (2): 255-262 (2000) Ee-Chien Chang, Chee-Keng Yap : A Wavelet Approach to Foveating Images. Symposium on Computational Geometry 1997 : 397-399 Ee-Chien Chang, Chee-Keng Yap : A Note on Improved Deterministic Time Simulation of Nondeterministic Space for Small Space. Inf. Process. Lett. 55 (3): 155-157 (1995) Ee-Chien Chang, Weiguo Wang , Mohan S. Kankanhalli : Multidimensional On-Line Bin-Packing: An Algorithm and its Average-Case Analysis. Inf. Process. Lett. 48 (3): 121-125 (1993) 1 [ 13 ] 2 [ 8 ] 3 [ 8 ] 4 [ 1 ] [ 8 ] [ 13 ] 5 [ 7 ] [ 11 ] 6 [ 5 ] 7 [ 12 ] 8 [ 1 ] 9 [ 8 ] 10 [ 13 ] 11 [ 9 ] 12 [ 2 ] [ 3 ] [ 4 ] [ 6 ] 13 [ 10 ] ![]() ©2004 Association for Computing Machinery |