Sciweavers

378 search results - page 71 / 76
» A framework for interactive analysis of timing constraints i...
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 7 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
RTCSA
2007
IEEE
14 years 1 months ago
Scheduling Algorithms for I/O Blockings with a Multi-frame Task Model
A task that suspends itself to wait for an I/O completion or to wait for an event from another node in distributed environments is called an I/O blocking task. In conventional har...
Shan Ding, Hiroyuki Tomiyama, Hiroaki Takada
UIST
2004
ACM
14 years 22 days ago
Video-based document tracking: unifying your physical and electronic desktops
This paper presents an approach for tracking paper documents on the desk over time and automatically linking them to the corresponding electronic documents using an overhead video...
Jiwon Kim, Steven M. Seitz, Maneesh Agrawala
VIS
2008
IEEE
172views Visualization» more  VIS 2008»
14 years 8 months ago
Color Design for Illustrative Visualization
Professional designers and artists are quite cognizant of the rules that guide the design of effective color palettes, from both aesthetic and attention-guiding points of view. In ...
Lujin Wang, Joachim Giesen, Kevin T. McDonnell, ...
SACMAT
2003
ACM
14 years 17 days ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka