Sciweavers

360 search results - page 42 / 72
» The Origins of the Translator's Workstation
Sort
View
SAINT
2007
IEEE
14 years 3 months ago
Local Production, Local Consumption Peer-to-Peer Architecture for a Dependable and Sustainable Social Infrastructure
Peer-to-peer (P2P) is a system of overlay networks such that participants can potentially take symmetrical roles. This translates itself into a design based on the philosophy of L...
Kenji Saito, Eiichi Morino, Yoshihiko Suko, Takaak...
CSL
2007
Springer
14 years 3 months ago
The Theory of Calculi with Explicit Substitutions Revisited
Calculi with explicit substitutions (ES) are widely used in different areas of computer science. Complex systems with ES were developed these last 15 years to capture the good comp...
Delia Kesner
ICPR
2006
IEEE
14 years 3 months ago
Transformation Invariance in Hand Shape Recognition
In hand shape recognition, transformation invariance is key for successful recognition. We propose a system that is invariant to small scale, translation and shape variations. Thi...
Thomas Coogan, Alistair Sutherland
ICMCS
2005
IEEE
101views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Rotation, scaling, and translation-invariant multi-bit watermarking based on log-polar mapping and discrete Fourier transform
This paper proposes an RST-invariant multi-bit watermarking system based on LPM and DFT. This system embeds the watermark in a rotation and translation invariant domain obtained b...
Wilson W. L. Fung, Akiomi Kunisa
SDMW
2004
Springer
14 years 2 months ago
Using Secret Sharing for Searching in Encrypted Data
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the...
Richard Brinkman, Jeroen Doumen, Willem Jonker