Sciweavers

853 search results - page 82 / 171
» Flexible authentication of images
Sort
View
GRID
2006
Springer
13 years 9 months ago
Toward an On-Demand Restricted Delegation Mechanism for Grids
Grids are intended to enable cross-organizational interactions which makes Grid security a challenging and nontrivial issue. In Grids, delegation is a key facility that can be used...
Mehran Ahsant, Jim Basney, Olle Mulmo, Adam J. Lee...
ICIP
2004
IEEE
14 years 10 months ago
Shape-adaptive coding using binary set splitting with k-d trees
The binary set splitting with k-d trees (BISK) algorithm is introduced. An embedded wavelet-based image coder based on the popular bitplane-coding paradigm, BISK is designed speci...
James E. Fowler
MVA
2000
191views Computer Vision» more  MVA 2000»
13 years 10 months ago
Development of Visual Inspection System Based on Vector Analysis Technique
The present paper proposes a new concept of image processing method based on vector representation for visual inspection test. The method was applied to detect defects and extract...
Masatake Sakuma, Katsumi Kubo, Shigeru Kanemoto, T...
ICIP
2010
IEEE
13 years 7 months ago
Towards unifying diffusion and exemplar-based inpainting
A novel framework for image inpainting is proposed, relying on graph-based diffusion processes. Depending on the construction of the graph, both flow-based and exemplar-based inpa...
Emmanuel d'Angelo, Pierre Vandergheynst
ICIP
2009
IEEE
13 years 6 months ago
A generalized vector-valued total variation algorithm
We propose a simple but flexible method for solving the generalized vector-valued TV (VTV) functional, which includes both the 2 -VTV and 1 -VTV regularizations as special cases, ...
Paul Rodriguez, Brendt Wohlberg