Sciweavers

252 search results - page 39 / 51
» Practical Data-Hiding: Additive Attacks Performance Analysis
Sort
View
MMSEC
2004
ACM
205views Multimedia» more  MMSEC 2004»
14 years 2 months ago
Wavelet-based blind watermarking of 3D models
Watermarking of 3D meshes has received a limited attention due to the difficulties encountered in extending the algorithms developed for 1D (audio) and 2D (images and video) signa...
F. Uccheddu, Massimiliano Corsini, Mauro Barni
VISUALIZATION
2005
IEEE
14 years 2 months ago
Query-Driven Visualization of Large Data Sets
We present a practical and general-purpose approach to large and complex visual data analysis where visualization processing, rendering and subsequent human interpretation is cons...
Kurt Stockinger, John Shalf, Kesheng Wu, E. Wes Be...
PST
2008
13 years 10 months ago
An Access Control Scheme for Protecting Personal Data
This paper presents a new personal data access control (PDAC) scheme that is inspired by the protection schemes practiced in communities for sharing valuable commodities. The PDAC...
Wilfred Villegas, Bader Ali, Muthucumaru Maheswara...
PAMI
2010
127views more  PAMI 2010»
13 years 7 months ago
The Structure of Multiplicative Motions in Natural Imagery
—A theoretical investigation of the frequency structure of multiplicative image motion signals is presented, e.g., as associated with translucency phenomena. Previous work has cl...
Konstantinos G. Derpanis, Richard P. Wildes
IEEEPACT
2002
IEEE
14 years 1 months ago
Using the Compiler to Improve Cache Replacement Decisions
Memory performance is increasingly determining microprocessor performance and technology trends are exacerbating this problem. Most architectures use set-associative caches with L...
Zhenlin Wang, Kathryn S. McKinley, Arnold L. Rosen...