Sciweavers

1242 search results - page 125 / 249
» Digital Objects as Passwords
Sort
View
ICIP
2002
IEEE
15 years 11 months ago
Robust bandlimited watermarking with trellis coded modulation
Digital watermarking is equivalent to bandlimited, powerlimited digital communication. The power limit is due to the requirement of imperceptible watermarks, and has long been rec...
Aria Nosratinia, Vimal Thilak
WWW
2008
ACM
15 years 10 months ago
A unified framework for name disambiguation
Name ambiguity problem has been a challenging issue for a long history. In this paper, we intend to make a thorough investigation of the whole problem. Specifically, we formalize ...
Jie Tang, Jing Zhang, Duo Zhang, Juanzi Li
EUROGRAPHICS
2010
Eurographics
15 years 7 months ago
Reinterpretable Imager: Towards Variable Post-Capture Space, Angle and Time Resolution in Photography
We describe a novel multiplexing approach to achieve tradeoffs in space, angle and time resolution in photography. We explore the problem of mapping useful subsets of time-varying...
Amit Agrawal, Ashok Veeraraghavan, Ramesh Raskar
TEI
2009
ACM
70views Hardware» more  TEI 2009»
15 years 4 months ago
Peripheral tangible interaction by analytic design
Tangible User Interfaces (TUIs) are commonly accepted as those in which the configuration of physical objects embodies digital system state, providing “graspable” digital medi...
Darren Edge, Alan F. Blackwell
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 4 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson