Sciweavers

7395 search results - page 1432 / 1479
» Social Modeling and i*
Sort
View
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 3 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
SC
2004
ACM
15 years 3 months ago
Computing - An Intellectual Lever for Multidisciplinary Discovery
: Legend says that Archimedes remarked, on the discovery of the lever, “Give me a place to stand, and I can move the world.” Today, computing pervades all aspects of science an...
Daniel A. Reed
SWS
2004
ACM
15 years 3 months ago
A formal semantics for P3P
The Platform for Privacy Preferences (P3P), developed by the W3C, provides an XML-based language for websites to encode their datacollection and data-use practices in a machine-re...
Ting Yu, Ninghui Li, Annie I. Antón
ICS
2004
Tsinghua U.
15 years 3 months ago
EXPERT: expedited simulation exploiting program behavior repetition
Studying program behavior is a central component in architectural designs. In this paper, we study and exploit one aspect of program behavior, the behavior repetition, to expedite...
Wei Liu, Michael C. Huang
RT
2004
Springer
15 years 3 months ago
All-Frequency Precomputed Radiance Transfer for Glossy Objects
We introduce a method based on precomputed radiance transfer (PRT) that allows interactive rendering of glossy surfaces and includes shadowing effects from dynamic, “all-frequen...
Xinguo Liu, Peter-Pike J. Sloan, Heung-Yeung Shum,...
« Prev « First page 1432 / 1479 Last » Next »