Sciweavers

490 search results - page 54 / 98
» Image Authentication Based on Distributed Source Coding
Sort
View
84
Voted
ECCV
2010
Springer
15 years 1 months ago
Geometry Construction from Caustic Images
In this work we investigate an inverse geometry problem. Given a light source, a diffuse plane and a caustic image, how must a geometric object look like (transmissive or reflect...
HPDC
2008
IEEE
14 years 9 months ago
Code coverage, performance approximation and automatic recognition of idioms in scientific applications
Basic data flow patterns which we call idioms, such as stream, transpose, reduction, random access and stencil, are common in scientific numerical applications. We hypothesize tha...
Jiahua He, Allan Snavely, Rob F. Van der Wijngaart...
76
Voted
ICDAR
2005
IEEE
15 years 3 months ago
Image Analysis for Efficient Categorization of Image-based Spam E-mail
To circumvent prevalent text-based anti-spam filters, spammers have begun embedding the advertisement text in images. Analogously, proprietary information (such as source code) ma...
Hrishikesh Aradhye, Gregory K. Myers, James A. Her...
SIGSOFT
2004
ACM
15 years 10 months ago
Implementing protocols via declarative event patterns
This paper introduces declarative event patterns (DEPs) as a means to implement protocols while improving their traceability, comprehensibility, and maintainability. DEPs are desc...
Robert J. Walker, Kevin Viggers
IEEEPACT
1998
IEEE
15 years 1 months ago
Data Dependence Analysis of Assembly Code
Determination of data dependences is a task typically performed with high-level language source code in today's optimizing and parallelizing compilers. Very little work has b...
Wolfram Amme, Peter Braun, Eberhard Zehendner, Fra...