Sciweavers

1757 search results - page 272 / 352
» Secure Content Validation
Sort
View
ECCV
2004
Springer
15 years 4 months ago
Probabilistic Spatial-Temporal Segmentation of Multiple Sclerosis Lesions
Abstract. In this paper we describe the application of a novel statistical videomodeling scheme to sequences of multiple sclerosis (MS) images taken over time. The analysis of the ...
Allon Shahar, Hayit Greenspan
ISW
2004
Springer
15 years 4 months ago
Chameleon Hashing Without Key Exposure
Abstract. Chameleon signatures are based on well established hashand-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest. Chameleon s...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
CODES
2003
IEEE
15 years 4 months ago
Schedule-aware performance estimation of communication architecture for efficient design space exploration
In this paper, we are concerned about the performance estimation of bus-based architectures assuming that the task partitioning on the processing components is already determined....
Sungchan Kim, Chaeseok Im, Soonhoi Ha
ICDAR
2003
IEEE
15 years 4 months ago
Recognition of Folding Process from Origami Drill Books
This paper describes a framework to recognizing and recreating folding process of origami based on illustrations of origami drill books. Illustration images acquired from origami ...
Hiroshi Shimanuki, Jien Kato, Toyohide Watanabe
JCDL
2003
ACM
119views Education» more  JCDL 2003»
15 years 4 months ago
How Fast Is Too Fast? Evaluating Fast Forward Surrogates for Digital Video
To support effective browsing, interfaces to digital video libraries should include video surrogates (i.e., smaller objects that can stand in for the videos in the on, analogous t...
Barbara M. Wildemuth, Gary Marchionini, Meng Yang,...