Sciweavers

1242 search results - page 28 / 249
» Digital Objects as Passwords
Sort
View
ERCIMDL
2009
Springer
167views Education» more  ERCIMDL 2009»
15 years 4 months ago
Conceptual Discovery of Educational Resources through Learning Objectives
This poster reports on current work with the NSF-funded Achievement Standards Network (ASN) to support discovery of educational resources in digital libraries using conceptual grap...
Stuart A. Sutton, Diny Golder
73
Voted
CSREASAM
2006
14 years 11 months ago
Security Analysis of the Digital Transmission Copy Protection Specification
- This paper analyzes the secure protocols in the digital transmission copy protection (DTCP) specification. The full authentication protocol in the specification is a combination ...
Haibo Tian, Yumin Wang
94
Voted
CGF
2010
114views more  CGF 2010»
14 years 4 months ago
Transparent and Specular Object Reconstruction
This state of the art report covers reconstruction methods for transparent and specular objects or phenomena. While the 3D acquisition of opaque surfaces with lambertian reflectan...
Ivo Ihrke, Kiriakos N. Kutulakos, Hendrik P. A. Le...
MSS
1999
IEEE
130views Hardware» more  MSS 1999»
15 years 2 months ago
Collection-Based Persistent Archives
The supercomputer center, digital library, and archival storage communities have common persistent archival storage requirements. Each of these communities is building software in...
Arcot Rajasekar, Richard Marciano, Reagan Moore
59
Voted
ICIP
2003
IEEE
15 years 11 months ago
A Bayesian framework for recursive object removal in movie post-production
Some of the most convincing film and video effects are created in digital post-production by removing apparatus that supports or manipulates actors and objects. Wires and people, ...
Anil C. Kokaram, Bill Collis, Simon Robinson