Sciweavers

788 search results - page 113 / 158
» Secure Data Objects Replication in Data Grid
Sort
View
117
Voted
VRST
1997
ACM
15 years 6 months ago
Surface deformation using the sensor glove
Intuitive 3D surface control and deformation are crucial to CAD/CAM. To do this in a virtual environment, however, the technique must be very efficient. A common method for shape ...
Lizhuang Ma, Rynson W. H. Lau, Jieqing Feng, Qunsh...
137
Voted
ICIP
2004
IEEE
16 years 4 months ago
A public-key authentication watermarking for binary images
Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
Hae Yong Kim, Ricardo L. de Queiroz
100
Voted
ICIP
2007
IEEE
16 years 4 months ago
Content Adaptive Heterogeneous Snakes
Active contour (snake) approaches have been proved to be efficient tools to extract object boundary precisely. One drawback of these methods is that state-of-the-art snake algorit...
András Hajdu, Ioannis Pitas
127
Voted
SPAA
2006
ACM
15 years 8 months ago
Modeling instruction placement on a spatial architecture
In response to current technology scaling trends, architects are developing a new style of processor, known as spatial computers. A spatial computer is composed of hundreds or eve...
Martha Mercaldi, Steven Swanson, Andrew Petersen, ...
120
Voted
GRID
2007
Springer
15 years 6 months ago
Optimizing multiple queries on scientific datasets with partial replicas
We propose strategies to efficiently execute a query workload, which consists of multiple related queries submitted against a scientific dataset, on a distributed-memory system in...
Li Weng, Ümit V. Çatalyürek, Tahs...