Sciweavers

93 search results - page 16 / 19
» Web 2.0 dictionary
Sort
View
NDSS
2002
IEEE
15 years 2 months ago
Detecting Steganographic Content on the Internet
Steganography is used to hide the occurrence of communication. Recent suggestions in US newspapers indicate that terrorists use steganography to communicate in secret with their a...
Niels Provos, Peter Honeyman
UIST
2000
ACM
15 years 2 months ago
Speed-dependent automatic zooming for browsing large documents
We propose a navigation technique for browsing large documents that integrates rate-based scrolling with automatic zooming. The view automatically zooms out when the user scrolls ...
Takeo Igarashi, Ken Hinckley
CW
2005
IEEE
14 years 11 months ago
Semantic Memory for Avatars in Cyberspace
Avatars that show intelligent behavior should have an access to general knowledge about the world, knowledge that humans store in their semantic memories. The simplest knowledge r...
Julian Szymanski, Tomasz Sarnatowicz, Wlodzislaw D...
ALENEX
2009
191views Algorithms» more  ALENEX 2009»
14 years 10 months ago
Theory and Practise of Monotone Minimal Perfect Hashing
Minimal perfect hash functions have been shown to be useful to compress data in several data management tasks. In particular, order-preserving minimal perfect hash functions [10] ...
Djamal Belazzougui, Paolo Boldi, Rasmus Pagh, Seba...
CACM
2010
104views more  CACM 2010»
14 years 9 months ago
Faster dimension reduction
Data represented geometrically in high-dimensional vector spaces can be found in many applications. Images and videos, are often represented by assigning a dimension for every pix...
Nir Ailon, Bernard Chazelle