Sciweavers

46 search results - page 8 / 10
» On the DMA mapping problem in direct device assignment
Sort
View
ICMCS
2005
IEEE
64views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Joint Image Halftoning and Watermarking in High-Resolution Digital Form
The existing halftone image watermarking methods were proposed to embed a watermark bit in a halftone dot, which corresponds to a pixel, to generate stego halftone image. This one...
Chao-Yong Hsu, Chun-Shien Lu
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
CVPR
2005
IEEE
13 years 9 months ago
Dense Photometric Stereo Using Tensorial Belief Propagation
We address the normal reconstruction problem by photometric stereo using a uniform and dense set of photometric images captured at fixed viewpoint. Our method is robust to spurio...
Kam-Lun Tang, Chi-Keung Tang, Tien-Tsin Wong
JSS
2008
68views more  JSS 2008»
13 years 7 months ago
An efficient iconic indexing strategy for image rotation and reflection in image databases
Spatial relationships are important issues for similarity-based retrieval in many image database applications. With the popularity of digital cameras and the related image process...
Wei-Horng Yeh, Ye-In Chang
PARA
2000
Springer
13 years 11 months ago
Experiments in Separating Computational Algorithm from Program Distribution and Communication
Our proposal has the following key features: 1) The separation of a distributed program into a pure algorithm (PurAl) and a distribution/communication declaration (DUAL). This yie...
Raphael B. Yehezkael, Yair Wiseman, H. G. Mendelba...