Sciweavers

1242 search results - page 130 / 249
» Digital Objects as Passwords
Sort
View
3DIM
2011
IEEE
13 years 10 months ago
Human Body Shape Prediction and Analysis Using Predictive Clustering Tree
—Predictive modeling aims at constructing models that predict a target property of an object based on its descriptions. In digital human modeling, it can be applied to predicting...
Pengcheng Xi, Hongyu Guo, Chang Shu
GIS
2004
ACM
15 years 11 months ago
A novel improvement to the R*-tree spatial index using gain/loss metrics
The R*-tree is a state-of-the-art spatial index structure. It has already found its way into commercial systems. The most important improvement of the R*-tree over the original R-...
Donghui Zhang, Tian Xia
MSWIM
2005
ACM
15 years 3 months ago
Content and service replication strategies in multi-hop wireless mesh networks
Emerging multi-hop wireless mesh networks have much different characteristics than the Internet. They have low dimensionality and large diameters. Content and service replication ...
Shudong Jin, Limin Wang
VRST
2005
ACM
15 years 3 months ago
Artistic reality: fast brush stroke stylization for augmented reality
The goal of augmented reality is to provide the user with a view of the surroundings enriched by virtual objects. Practically all augmented reality systems rely on standard realti...
Jan Fischer, Dirk Bartz, Wolfgang Straßer
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 3 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal