Sciweavers

977 search results - page 153 / 196
» Secret image sharing
Sort
View
SCCC
1999
IEEE
15 years 4 months ago
Safe-Threads: A New Model for Object-Oriented Multi-Threaded Languages
Threads have been present in programming languages for some time now. However, they have a bad image among software developers because they lead to unreliable applications. Most o...
Luis Mateu, José M. Piquer
APGV
2008
ACM
164views Visualization» more  APGV 2008»
15 years 1 months ago
Quantifying usability in secure graphics: assessing the user costs of protecting 3D content
There is an increasing need for methods for secure dissemination of interactive 3D graphics content, providing protection for valuable 3D models while still allowing them to be wi...
Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Tho...
CN
2007
137views more  CN 2007»
14 years 12 months ago
Georoy: A location-aware enhancement to Viceroy peer-to-peer algorithm
The success of experiences such as Seattle and Houston Wireless has attracted the attention on the so called wireless mesh community networks. These are wireless multihop networks...
Laura Galluccio, Giacomo Morabito, Sergio Palazzo,...
MICCAI
2007
Springer
16 years 23 days ago
Ultrasound Myocardial Elastography and Registered 3D Tagged MRI: Quantitative Strain Comparison
Ultrasound Myocardial Elastography (UME) and Tagged Magnetic Resonance Imaging (tMRI) are two imaging modalities that were developed in the recent years to quantitatively estimate ...
Zhen Qian, Wei-Ning Lee, Elisa E. Konofagou, Dimit...
WWW
2009
ACM
16 years 15 days ago
Tag ranking
Social media sharing web sites like Flickr allow users to annotate images with free tags, which significantly facilitate Web image search and organization. However, the tags assoc...
Dong Liu, Xian-Sheng Hua, Linjun Yang, Meng Wang, ...