Sciweavers

44 search results - page 7 / 9
» Detecting Possible Manipulators in Elections
Sort
View
IUI
1997
ACM
13 years 9 months ago
The Pedagogical Design Studio: Exploiting Artifact-Based Task Models for Constructivist Learning
Intelligentlearning environments that support constructivism shouldprovideactivelearningexperiencesthatarecustomized for individuallearners. To do so, they must determine learner ...
James C. Lester, Patrick J. Fitzgerald, Brian A. S...
ICIP
2010
IEEE
13 years 3 months ago
Undetectable image tampering through JPEG compression anti-forensics
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting ...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...
ICASSP
2010
IEEE
13 years 5 months ago
Forensic estimation and reconstruction of a contrast enhancement mapping
Due to the ease with which convincing digital image forgeries can be created, a need has arisen for digital forensic techniques capable of detecting image manipulation. Once image...
Matthew C. Stamm, K. J. Ray Liu
WIA
2001
Springer
13 years 9 months ago
Adaptive Rule-Driven Devices - General Formulation and Case Study
A formal device is said to be adaptive whenever its behavior changes dynamically, in a direct response to its input stimuli, without interference of external agents, even its user...
João José Neto
ICIP
2006
IEEE
14 years 7 months ago
Image Tampering Identification using Blind Deconvolution
Digital images have been used in growing number of applications from law enforcement and surveillance, to medical diagnosis and consumer photography. With such widespread populari...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu