Sciweavers

3058 search results - page 91 / 612
» Reflections on
Sort
View
CCS
2011
ACM
12 years 7 months ago
iSpy: automatic reconstruction of typed input from compromising reflections
Rahul Raguram, Andrew M. White 0002, Dibyendusekha...
OOPSLA
2004
Springer
14 years 1 months ago
Mirrors: design principles for meta-level facilities of object-oriented programming languages
We identify three design principles for reflection and metaprogramming facilities in object oriented programming languages. Encapsulation: meta-level facilities must encapsulate t...
Gilad Bracha, David Ungar
CAIP
1993
Springer
157views Image Analysis» more  CAIP 1993»
13 years 12 months ago
Photometric Stereo for Non-Lambertian Surfaces Using Color Information
One robust method to reconstruct shape is photometric stereo (PMS), which reconstructs surface orientation using the Lambertian reflection properties of the surface material. To i...
Karsten Schlüns
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
13 years 11 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
MVA
1996
205views Computer Vision» more  MVA 1996»
13 years 9 months ago
Highlight Separation Using Multiple Images with Intensities and Ranges.
In this paper, a method for extracting influences of specular reflection and shade from multiple color images is described. As regards extraction, the di-chromatic reflection mode...
Masaki Otsuki, Yukio Sato