Sciweavers

11484 search results - page 2247 / 2297
» Modeling in the Large and Modeling in the Small
Sort
View
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
14 years 11 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
VCIP
2003
126views Communications» more  VCIP 2003»
14 years 11 months ago
Media handling for visual information retrieval in VizIR
This paper describes how the handling of visual media objects is implemented in the visual information retrieval project VizIR. Essentially, four areas are concerned: media access...
Horst Eidenberger
DELOS
2000
14 years 11 months ago
Using the Wavelet Transform to Learn from User Feedback
User feedback has proven very successful to query large multimedia databases. Due to the nature of the data representation and the mismatch between mathematical models and human p...
Ilaria Bartolini, Paolo Ciaccia, Florian Waas
WORM
2003
14 years 11 months ago
Access for sale: a new class of worm
The damage inflicted by viruses and worms has been limited because the payloads that are most lucrative to malware authors have also posed the greatest risks to them. The problem...
Stuart E. Schechter, Michael D. Smith
DAGSTUHL
1997
14 years 11 months ago
Scattered Data Techniques for Surfaces
This survey presents several techniques for solving variants of the following scattered data interpolation problem: given a nite set of N points in R3, nd a surface that interpola...
Suresh K. Lodha, Richard Franke
« Prev « First page 2247 / 2297 Last » Next »