Sciweavers

46 search results - page 8 / 10
» On the DMA mapping problem in direct device assignment
Sort
View
83
Voted
ICMCS
2005
IEEE
64views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Joint Image Halftoning and Watermarking in High-Resolution Digital Form
The existing halftone image watermarking methods were proposed to embed a watermark bit in a halftone dot, which corresponds to a pixel, to generate stego halftone image. This one...
Chao-Yong Hsu, Chun-Shien Lu
75
Voted
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 5 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
125
Voted
CVPR
2005
IEEE
15 years 7 days ago
Dense Photometric Stereo Using Tensorial Belief Propagation
We address the normal reconstruction problem by photometric stereo using a uniform and dense set of photometric images captured at fixed viewpoint. Our method is robust to spurio...
Kam-Lun Tang, Chi-Keung Tang, Tien-Tsin Wong
91
Voted
JSS
2008
68views more  JSS 2008»
14 years 10 months ago
An efficient iconic indexing strategy for image rotation and reflection in image databases
Spatial relationships are important issues for similarity-based retrieval in many image database applications. With the popularity of digital cameras and the related image process...
Wei-Horng Yeh, Ye-In Chang
82
Voted
PARA
2000
Springer
15 years 1 months ago
Experiments in Separating Computational Algorithm from Program Distribution and Communication
Our proposal has the following key features: 1) The separation of a distributed program into a pure algorithm (PurAl) and a distribution/communication declaration (DUAL). This yie...
Raphael B. Yehezkael, Yair Wiseman, H. G. Mendelba...