Sciweavers

5630 search results - page 980 / 1126
» Computability in Specification
Sort
View
MM
2004
ACM
97views Multimedia» more  MM 2004»
15 years 10 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
SAC
2004
ACM
15 years 10 months ago
The eduSource Communication Language: implementing open network for learning repositories and services
Interoperability is one of the main issues in creating a networked system of repositories The approaches range from simply forcing one metadata standard on all participating repos...
Marek Hatala, Griff Richards, Timmy Eap, Jordan Wi...
SAC
2004
ACM
15 years 10 months ago
Combining analysis and synthesis in a model of a biological cell
for ideas, and then abstract away from these ideas to produce algorithmic processes that can create problem solutions in a bottom-up manner. We have previously described a top-dow...
Ken Webb, Tony White
ECCV
2004
Springer
15 years 10 months ago
CT from an Unmodified Standard Fluoroscopy Machine Using a Non-reproducible Path
3D reconstruction from image data is required in many medical procedures. Recently, the use of fluoroscopy data to generate these 3D models has been explored. Most existing methods...
Chris Baker, Christian Debrunner, Mohamed Mahfouz,...
CHI
2010
ACM
15 years 10 months ago
The true cost of unusable password policies: password use in the wild
HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We pr...
Philip Inglesant, Martina Angela Sasse