Sciweavers

47 search results - page 6 / 10
» A Novel Approach to Hide Credentials
Sort
View
70
Voted
ICIP
2007
IEEE
15 years 3 months ago
Quality-Aware Video
Recent development in network visual communications has emphasized on the need of objective, reliable and easy-to-use video quality assessment (VQA) systems. This paper introduces...
Basavaraj Hiremath, Qiang Li, Zhou Wang
WACV
2002
IEEE
15 years 2 months ago
Pose Estimation and Integration for Complete 3D Model Reconstruction
An automatic 3D model reconstruction technique is presented to acquire complete 3D models of real objects. The technique is based on novel approaches to pose estimation and integr...
Soon-Yong Park, Murali Subbarao
VIS
2007
IEEE
169views Visualization» more  VIS 2007»
15 years 10 months ago
Transform Coding for Hardware-accelerated Volume Rendering
Hardware-accelerated volume rendering using the GPU is now the standard approach for real-time volume rendering, although limited graphics memory can present a problem when renderi...
Nathaniel Fout, Kwan-Liu Ma
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 3 months ago
Digital invisible ink and its applications in steganography
A novel information-hiding methodology denoted as digital invisible ink is introduced. The proposed approach is inspired by the invisible ink in the real world and can be regarded...
Chun-Hsiang Huang, Shang-Chih Chuang, Ja-Ling Wu
SYNASC
2005
IEEE
98views Algorithms» more  SYNASC 2005»
15 years 3 months ago
Archeology of Code Duplication: Recovering Duplication Chains from Small Duplication Fragments
Code duplication is a common problem, and a wellknown sign of bad design. As a result of that, in the last decade, the issue of detecting code duplication led to various solutions...
Richard Wettel, Radu Marinescu