Sciweavers

221 search results - page 26 / 45
» Advantages of User Authentication Using Unclear Images
Sort
View
TVCG
2012
213views Hardware» more  TVCG 2012»
11 years 11 months ago
Mesh-Driven Vector Field Clustering and Visualization: An Image-Based Approach
—Vector field visualization techniques have evolved very rapidly over the last two decades, however, visualizing vector fields on complex boundary surfaces from computational ...
Zhenmin Peng, Edward Grundy, Robert S. Laramee, Gu...
HUC
2010
Springer
13 years 9 months ago
Groupthink: usability of secure group association for wireless devices
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devic...
Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ers...
MM
2005
ACM
171views Multimedia» more  MM 2005»
14 years 2 months ago
Semantic manifold learning for image retrieval
Learning the user’s semantics for CBIR involves two different sources of information: the similarity relations entailed by the content-based features, and the relevance relatio...
Yen-Yu Lin, Tyng-Luh Liu, Hwann-Tzong Chen
SOUPS
2010
ACM
14 years 10 days ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
WSCG
2004
153views more  WSCG 2004»
13 years 9 months ago
A New Algorithm for Adding Color to Video or Animation Clips
Colorizing grayscale video is a useful technique in scientific computing visualization and entertainment. In this paper, we introduce a method to transfer color from a reference i...
Zhigeng Pan, Zhaohua Dong, Mingmin Zhang