Sciweavers

2061 search results - page 67 / 413
» Authorization for Metacomputing Applications
Sort
View
102
Voted
IJCNN
2000
IEEE
15 years 5 months ago
A Neural Network Approach for Visual Cryptography
In this paper, we propose a neural-network approach for visual authorization. It is an application on visual cryptography. The scheme contains a key-share and a set of user-shares....
Tai-Wen Yue, Suchen Chiang
ITS
1998
Springer
129views Multimedia» more  ITS 1998»
15 years 4 months ago
Cognitive Measures for Visual Concept Teaching with Intelligent Tutoring Systems
Abstract: This article reports on the application of general cognitive measures to describe and order the knowledge base of radiological images, aimed at the teaching of visual con...
Andrey R. Pimentel, Alexandre I. Direne
91
Voted
WCNC
2010
IEEE
15 years 4 months ago
V-Tokens for Conditional Pseudonymity in VANETs
—Privacy is an important requirement in vehicle networks, because vehicles broadcast detailed location information. Also of importance is accountability due to safety critical ap...
Florian Schaub, Frank Kargl, Zhendong Ma, Michael ...
WSC
2008
15 years 2 months ago
An integrated CAD and simulation model for concrete operations
Pouring a concrete raft slab is a classic problem in downtown projects because it requires special arrangements to be made with city authorities to close the area around the proje...
Aly Abdel Fattah, Janaka Y. Ruwanpura
104
Voted
WCE
2007
15 years 1 months ago
Iterative Single-Image Digital Super-Resolution Using Partial High-Resolution Data
—The subject of extracting high-resolution data from low-resolution images is one of the most important digital processing applications in recent years, attracting much research....
Eran Gur, Zeev Zalevsky