Sciweavers

3389 search results - page 170 / 678
» Perspectives on system identification
Sort
View
ICIP
2009
IEEE
13 years 6 months ago
A compressive-sensing based watermarking scheme for sparse image tampering identification
In this paper we describe a robust watermarking scheme for image tampering identification and localization. A compact representation of the image is first produced by assembling a...
Giuseppe Valenzise, Marco Tagliasacchi, Stefano Tu...
VR
2009
IEEE
159views Virtual Reality» more  VR 2009»
14 years 3 months ago
Indoor vs. Outdoor Depth Perception for Mobile Augmented Reality
We tested users’ depth perception of virtual objects in our mobile augmented reality (AR) system in both indoor and outdoor environments using a depth matching task. The indoor ...
Mark A. Livingston, Zhuming Ai, J. Edward Swan II,...
ADAEUROPE
2003
Springer
14 years 1 months ago
Modules for Crosscutting Models
Traditional programming languages assume that real-world systems have “intuitive”, mind-independent, preexisting concept hierarchies. However, our perception of the world depen...
Mira Mezini, Klaus Ostermann
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
14 years 1 months ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
EUROCRYPT
1995
Springer
13 years 11 months ago
Quantum Oblivious Mutual Identification
We coiisider a situation where two parties, Alice and Bob, share a common secret string arid would like to mutually check their knowledge of that string. We describe a simple and e...
Claude Crépeau, Louis Salvail