Sciweavers

131 search results - page 14 / 27
» Copy and paste redeemed
Sort
View
ICPR
2006
IEEE
14 years 1 months ago
Robust Detection of Region-Duplication Forgery in Digital Image
Region duplication forgery, in which a part of a digital image is copied and then pasted to another portion of the same image in order to conceal an important object in the scene,...
Weiqi Luo, Jiwu Huang, Guoping Qiu
WCRE
1999
IEEE
13 years 12 months ago
Partial Redesign of Java Software Systems Based on Clone Analysis
Code duplication, plausibly caused by copying source code and slightly modifying it, is often observed in large systems. Clone detection and documentation have been investigated b...
Magdalena Balazinska, Ettore Merlo, Michel Dagenai...
SPIESR
1996
126views Database» more  SPIESR 1996»
13 years 9 months ago
Tools for Compressed-Domain Video Indexing and Editing
Indexing and editing digital video directly in the compressed domain offer many advantages in terms of storage efficiency and processing speed. We have designed automatic tools in...
Jianhao Meng, Shih-Fu Chang
SIN
2010
ACM
13 years 5 months ago
Analysis of privacy in online social networks of runet
In recent years, social networking sites (SNSs) gained high popularity among Internet users as they combine the best of both worlds: befriending people outside real life situation...
Slava Kisilevich, Florian Mansmann
CCS
2005
ACM
14 years 1 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone