Sciweavers

1965 search results - page 157 / 393
» Information shared by many objects
Sort
View
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 10 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
VMV
2004
103views Visualization» more  VMV 2004»
15 years 6 months ago
Consistent penetration depth estimation for deformable collision response
Penalty approaches can be used to efficiently resolve collisions of dynamically simulated rigid and deformable objects. These methods compute penalty forces based on the penetrati...
Bruno Heidelberger, Matthias Teschner, Richard Kei...
ICIP
2009
IEEE
16 years 6 months ago
Circular Blurred Shape Model For Symbol Spotting In Documents
Symbol spotting problem requires feature extraction strategies able to generalize from training samples and to localize the target object while discarding most part of the image. ...
155
Voted
ER
2003
Springer
129views Database» more  ER 2003»
15 years 10 months ago
Extending Conceptual Models for Web Based Applications
Abstract. The next phase envisioned for the World Wide Web is automated ad-hoc interaction between intelligent agents, web services, databases and semantic web enabled applications...
Phillipa Oaks, Arthur H. M. ter Hofstede, David Ed...
EP
1998
Springer
15 years 9 months ago
Memory Scalability in Constraint-Based Multimedia Style Sheet Systems
Abstract. Multimedia style sheet systems uniformly use a constraintbased model of layout. Constraints provide a uniform mechanism for all aspects of style management and layout and...
Terry Cumaranatunge, Ethan V. Munson