Sciweavers

1242 search results - page 209 / 249
» Digital Objects as Passwords
Sort
View
DAGSTUHL
2001
14 years 11 months ago
Visualization for the Mind's Eye
Software visualization has been almost exclusively tackled from the visual point of view; this means visualization occurs exclusively through the visual channel. This approach has ...
Nelson A. Baloian, Wolfram Luther
CSREASAM
2003
14 years 11 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
IMAGING
2004
14 years 11 months ago
Does an Expert Use memory Colors to Adjust Images?
In a previous experiment, we have studied the preference judgement of pictorial images with image experts and naive observers. We asked image experts to improve pictorial images t...
Clotilde Boust, Ferruccio Cittadini, Mohamed Ben C...
MVA
1990
162views Computer Vision» more  MVA 1990»
14 years 11 months ago
Map-Driven Image Interpretation by Associative Model Indexing
d at a high abstraction level, and consists in an expectation-driven search starting from symbolic object descriptions and using a version of a distributed blackboard system for re...
Gian Luca Foresti, Vittorio Murino, Carlo S. Regaz...
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 9 months ago
The Physical World as a Virtual Reality
This paper explores the idea that the universe is a virtual reality created by information processing, and relates this strange idea to the findings of modern physics about the ph...
Brian Whitworth