Sciweavers

2327 search results - page 371 / 466
» Secure Image Filtering
Sort
View
ACISP
2005
Springer
15 years 7 months ago
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based
We present the first group signature scheme with provable security and signature size O(λ) bits where the group manager, the group members, and the Open Authority (OA) are all id...
Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
ICMCS
2010
IEEE
146views Multimedia» more  ICMCS 2010»
15 years 2 months ago
Privacy-preserving approximation of L1 distance for multimedia applications
Alice and Bob possess sequences x and y respectively and would like to compute the 1 distance, namely x - y 1 under privacy and communication constraints. The privacy constraint r...
Shantanu Rane, Wei Sun, Anthony Vetro
CHI
1994
ACM
15 years 5 months ago
Toolglass and magic lenses: the see-through interface
ToolglassTM widgets are new user interface tools that can appear, as though on a transparent sheet of glass, between an application and a traditional cursor. They can be positione...
Eric A. Bier, Maureen C. Stone, Kenneth A. Pier, K...
BMCBI
2010
183views more  BMCBI 2010»
15 years 1 months ago
SING: Subgraph search In Non-homogeneous Graphs
Background: Finding the subgraphs of a graph database that are isomorphic to a given query graph has practical applications in several fields, from cheminformatics to image unders...
Raffaele Di Natale, Alfredo Ferro, Rosalba Giugno,...
CGF
2010
111views more  CGF 2010»
15 years 1 months ago
Density-based Outlier Rejection in Monte Carlo Rendering
The problem of noise in Monte-Carlo rendering arising from estimator variance is well-known and well-studied. In this work, we concentrate on identifying individual light paths as...
Christopher DeCoro, Tim Weyrich, Szymon Rusinkiewi...