Sciweavers

2346 search results - page 361 / 470
» Tactile Change Detection
Sort
View
UIC
2009
Springer
15 years 4 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
COSIT
2009
Springer
134views GIS» more  COSIT 2009»
15 years 4 months ago
Evaluating the Effectiveness and Efficiency of Visual Variables for Geographic Information Visualization
We propose an empirical, perception-based evaluation approach for assessing the effectiveness and efficiency of longstanding cartographic design principles applied to 2D map displa...
Simone Garlandini, Sara Irina Fabrikant
INCDM
2009
Springer
131views Data Mining» more  INCDM 2009»
15 years 4 months ago
Computer-Aided Diagnosis in Brain Computed Tomography Screening
Currently, interpretation of medical images is almost exclusively made by specialized physicians. Although, the next decades will most certainly be of change and computer-aided dia...
Hugo Peixoto, Victor Alves
ISVC
2009
Springer
15 years 4 months ago
Image Compression Based on Visual Saliency at Individual Scales
5th International Symposium on Visual Computing, Las Vegas, Nevada, USA, Nov 30 - Dec 2, 2009 The goal of lossy image compression ought to be reducing entropy while preserving the...
Stella X. Yu, Dimitri A. Lisin
IWDW
2009
Springer
15 years 4 months ago
Estimating the Information Theoretic Optimal Stego Noise
We recently developed a new benchmark for steganography, underpinned by the square root law of capacity, called Steganographic Fisher Information (SFI). It is related to the multip...
Andrew D. Ker