Sciweavers

358 search results - page 26 / 72
» Protocols from perceptual observations
Sort
View
SIBGRAPI
2007
IEEE
15 years 4 months ago
Data Hiding for Binary Documents Robust to Print-Scan, Photocopy and Geometric Distortions
This paper presents a data hiding technique for printed bicolor documents. It inserts tiny dots, hardly noticeable at normal reading distance, to embed the message. For message ex...
Hae Yong Kim, Joceli Mayer
ICCCN
2008
IEEE
15 years 4 months ago
A Preliminary Look at the Privacy of SSH Tunnels
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
JOC
2008
86views more  JOC 2008»
14 years 10 months ago
Lower Bounds and Impossibility Results for Concurrent Self Composition
In the setting of concurrent self composition, a single protocol is executed many times concurrently by a single set of parties. In this paper, we prove lower bounds and impossibi...
Yehuda Lindell
ROMAN
2007
IEEE
115views Robotics» more  ROMAN 2007»
15 years 4 months ago
Issues in Human/Robot Task Structuring and Teaching
—Teaching a robot new skills may require that the teacher scaffolds the teaching experience appropriately. However, due to inherent assumptions made by a human teacher the scaffo...
Joe Saunders, Nuno Otero, Chrystopher L. Nehaniv
RT
2001
Springer
15 years 2 months ago
Measuring the Perception of Visual Realism in Images
One of the main goals in realistic rendering is to generate images that are indistinguishable from photographs – but how do observers decide whether an image is photographic or c...
Paul Rademacher, Jed Lengyel, Edward Cutrell, Turn...