Sciweavers

14 search results - page 2 / 3
» Transformation from Identity Stone Age to Digital Identity
Sort
View
CHI
2010
ACM
14 years 3 days ago
Homeless young people's experiences with information systems: life and work in a community technology center
This paper explores how homeless young people, aged 1325, make use of information systems in daily life. Observed in a community technology center, four different examples of uses...
Jill Palzkill Woelfer, David G. Hendry
LCTRTS
2007
Springer
13 years 11 months ago
Combining source-to-source transformations and processor instruction set extensions for the automated design-space exploration o
Industry’s demand for flexible embedded solutions providing high performance and short time-to-market has led to the development of configurable and extensible processors. The...
Richard Vincent Bennett, Alastair Colin Murray, Bj...
MICCAI
2001
Springer
13 years 9 months ago
A Binary Entropy Measure to Assess Nonrigid Registration Algorithms
Assessment of normal and abnormal anatomical variability requires a coordinate system enabling inter-subject comparison. We present a binary minimum entropy criterion to assess af...
Simon K. Warfield, Jan Rexilius, Petra S. Huppi, T...
CAIP
2005
Springer
120views Image Analysis» more  CAIP 2005»
13 years 10 months ago
A New Approach to Camera Image Indexing
Abstract. This paper presents a color filter array (CFA) image indexing approach. To enhance the functionality of single-sensor consumer electronics such as digital cameras, imagi...
Rastislav Lukac, Konstantinos N. Plataniotis
ICMCS
2007
IEEE
131views Multimedia» more  ICMCS 2007»
13 years 11 months ago
Image Source Coding Forensics via Intrinsic Fingerprints
In this digital era, digital multimedia contents are often transmitted over networks without any protection. This raises serious security concerns since the receivers/subscribers ...
Wan-Yi Sabrina Lin, Steven Tjoa, H. Vicky Zhao, K....