Sciweavers

490 search results - page 81 / 98
» Image Authentication Based on Distributed Source Coding
Sort
View
68
Voted
UIST
1996
ACM
15 years 1 months ago
XXL: A Dual Approach for Building User Interfaces
This paper presents XXL, a new interactive development system for building user interfaces which is based on the concept of textual and visual equivalence. XXL includes an interac...
Eric Lecolinet
ACSAC
2008
IEEE
14 years 11 months ago
Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage
Much effort has been expended in recent years to create large sets of hash codes from known files. Distributing these sets has become more difficult as these sets grow larger. Mea...
Paul F. Farrell Jr., Simson L. Garfinkel, Douglas ...
96
Voted
MM
2005
ACM
171views Multimedia» more  MM 2005»
15 years 3 months ago
Semantic manifold learning for image retrieval
Learning the user’s semantics for CBIR involves two different sources of information: the similarity relations entailed by the content-based features, and the relevance relatio...
Yen-Yu Lin, Tyng-Luh Liu, Hwann-Tzong Chen
DCOSS
2005
Springer
15 years 3 months ago
Routing Explicit Side Information for Data Compression in Wireless Sensor Networks
Abstract. Two difficulties in designing data-centric routes [2–5] in wireless sensor networks are the lack of reasonably practical data aggregation models and the high computatio...
Huiyu Luo, Gregory J. Pottie
93
Voted
HASKELL
2008
ACM
14 years 10 months ago
Haskell: batteries included
The quality of a programming language itself is only one component in the ability of application writers to get the job done. Programming languages can succeed or fail based on th...
Duncan Coutts, Isaac Potoczny-Jones, Don Stewart