Sciweavers

135 search results - page 14 / 27
» Attribute-based signature and its applications
Sort
View
MM
2003
ACM
132views Multimedia» more  MM 2003»
14 years 3 months ago
A flexible and scalable authentication scheme for JPEG2000 image codestreams
JPEG2000 is an emerging standard for still image compression and is becoming the solution of choice for many digital imaging fields and applications. An important aspect of JPEG2...
Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong ...
ICIP
1997
IEEE
14 years 11 months ago
Using the Fourier Slice Theorem for Representation of Object Views and Models with application to Face Recognition
A novel method unifying viewer and model centered approaches for representing structurally complex 3-D objects like human faces is presented. The uni ed 3D frequency-domain repres...
Dibyendu Nandy, Jezekiel Ben-Arie
DSN
2008
IEEE
14 years 4 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
ACMICEC
2007
ACM
129views ECommerce» more  ACMICEC 2007»
14 years 1 months ago
Modeling trust in e-commerce: an approach based on user requirements
E-commerce is presently operating under its expected capacity, mainly because traders find it very difficult to trust one another online for trading decisions. It is therefore ver...
Alireza Pourshahid, Thomas T. Tran
JUCS
2006
126views more  JUCS 2006»
13 years 9 months ago
Behavioral Institutions and Refinements in Generalized Hidden Logics
: We investigate behavioral institutions and refinements in the context of the object oriented paradigm. The novelty of our approach is the application of generalized abstract alge...
Manuel A. Martins