This paper presents a data hiding technique for printed bicolor documents. It inserts tiny dots, hardly noticeable at normal reading distance, to embed the message. For message ex...
— Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the priv...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
In the setting of concurrent self composition, a single protocol is executed many times concurrently by a single set of parties. In this paper, we prove lower bounds and impossibi...
—Teaching a robot new skills may require that the teacher scaffolds the teaching experience appropriately. However, due to inherent assumptions made by a human teacher the scaffo...
One of the main goals in realistic rendering is to generate images that are indistinguishable from photographs – but how do observers decide whether an image is photographic or c...
Paul Rademacher, Jed Lengyel, Edward Cutrell, Turn...