Sciweavers

533 search results - page 19 / 107
» Uncontrolled Modulation Imaging
Sort
View
ICIP
1998
IEEE
15 years 11 months ago
Image/Video Scaling Algorithm based on Multirate Signal Processing
This paper presents an approach for image and video scaling using multirate signal processing. The main objective is to scale images with arbitrary rational scaling ratio without ...
Soontorn Oraintara, Truong Q. Nguyen
AI
2005
Springer
15 years 3 months ago
Privacy Compliance Enforcement in Email
Privacy is one of the main societal concerns raised by critics of the uncontrolled growth and spread of information technology in developed societies. The purpose of this paper is ...
Quintin Armour, William Elazmeh, Nour El-Kadri, Na...
SIGOPS
2008
183views more  SIGOPS 2008»
14 years 10 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti
EJC
2008
14 years 10 months ago
Tabloids and weighted sums of characters of certain modules of the symmetric groups
We consider certain modules of the symmetric groups whose basis elements are called tabloids. As modules of the symmetric groups, some of these are isomorphic to Springer modules. ...
Yasuhide Numata
IWDW
2007
Springer
15 years 4 months ago
Dither Modulation in the Logarithmic Domain
Abstract. Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ru...
Pedro Comesaña, Fernando Pérez-Gonz&...