Sciweavers

988 search results - page 25 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
INTERACT
2003
13 years 10 months ago
High-Density Cursor: a Visualization Technique that Helps Users Keep Track of Fast-moving Mouse Cursors
: As bigger screens and multi-monitor configurations become more popular, users employ higher mouse accelerations in order to traverse the screen reasonably quickly. The faster the...
Patrick Baudisch, Edward Cutrell, George G. Robert...
ADHOCNOW
2004
Springer
14 years 2 months ago
Improving Distance Based Geographic Location Techniques in Sensor Networks
Supporting nodes without Global Positioning System (GPS) capability, in wireless ad hoc and sensor networks, has numerous applications in guidance and surveying systems in use toda...
Michel Barbeau, Evangelos Kranakis, Danny Krizanc,...
ICMCS
2000
IEEE
114views Multimedia» more  ICMCS 2000»
14 years 1 months ago
A Panorama-Based Technique for Annotation Overlay and Its Real-Time Implementation
The panorama-based annotation method described in this paper uses a panoramic image as the source of information about the positions of the annotations. It finds image alignment p...
Masakatsu Kourogi, Takeshi Kurata, Katsuhiko Sakau...
ICDAR
2009
IEEE
13 years 6 months ago
A Robust Wavelet Transform Based Technique for Video Text Detection
In this paper, we propose a new method based on wavelet transform, statistical features and central moments for both graphics and scene text detection in video images. The method ...
Palaiahnakote Shivakumara, Trung Quy Phan, Chew Li...
SCAM
2007
IEEE
14 years 3 months ago
Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes
To encourage open source/libre software development, it is desirable to have tools that can help to identify open source license violations. This paper describes the implementatio...
Arnoldo José Müller Molina, Takeshi Sh...