Sciweavers

2693 search results - page 314 / 539
» French Order Without Order
Sort
View
SIBGRAPI
2003
IEEE
15 years 10 months ago
Secure Authentication Watermarking for Binary Images
Abstract. Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authen...
Hae Yong Kim, Amir Afif
138
Voted
VR
2003
IEEE
164views Virtual Reality» more  VR 2003»
15 years 10 months ago
VIS-Tracker: A Wearable Vision-Inertial Self-Tracker
We present a demonstrated and commercially viable self-tracker, using robust software that fuses data from inertial and vision sensors. Compared to infrastructurebased trackers, s...
Eric Foxlin, Leonid Naimark
125
Voted
ISPD
2003
ACM
88views Hardware» more  ISPD 2003»
15 years 10 months ago
Porosity aware buffered steiner tree construction
— In order to achieve timing closure on increasingly complex IC designs, buffer insertion needs to be performed on thousands of nets within an integrated physical synthesis syste...
Charles J. Alpert, Gopal Gandham, Milos Hrkic, Jia...
139
Voted
ADBIS
2003
Springer
95views Database» more  ADBIS 2003»
15 years 10 months ago
Distance Join Queries of Multiple Inputs in Spatial Databases
Let a tuple of n objects obeying a query graph (QG) be called the n-tuple. The “Ddistance-value” of this n-tuple is the value of a linear function of distances of the n objects...
Antonio Corral, Yannis Manolopoulos, Yannis Theodo...
ATAL
2003
Springer
15 years 10 months ago
On optimal outcomes of negotiations over resources
We analyse scenarios in which self-interested agents negotiate with each other in order to agree on deals to exchange resources. We consider two variants of the framework, one whe...
Ulrich Endriss, Nicolas Maudet, Fariba Sadri, Fran...