Sciweavers

164 search results - page 23 / 33
» A History of C : 1979-1991
Sort
View
ICIP
2010
IEEE
13 years 4 months ago
Undetectable image tampering through JPEG compression anti-forensics
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting ...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...
ICONFERENCE
2011
13 years 1 months ago
Beyond promotion and protection: creators, audiences and common ground in user-generated media
In this paper, we present findings from a qualitative study of producers in a specific creative domain—online digital photography. We used social psychology and linguistic conce...
Eric C. Cook, Stephanie D. Teasley
ICUIMC
2011
ACM
12 years 10 months ago
Overhead analysis of query localization optimization and routing
Query localization is an improved extension of on-demand routing protocols for ad hoc networks. It makes use of prior routing histories to localize the query flood to a limited re...
Wenzheng Xu, Yongmin Zhang, Weifa Liang
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
12 years 9 months ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...
ACII
2011
Springer
12 years 6 months ago
Predicting Facial Indicators of Confusion with Hidden Markov Models
Affect plays a vital role in learning. During tutoring, particular affective states may benefit or detract from student learning. A key cognitiveaffective state is confusion, which...
Joseph F. Grafsgaard, Kristy Elizabeth Boyer, Jame...