Sciweavers

961 search results - page 147 / 193
» Visual Cryptography on Graphs
Sort
View
VL
1992
IEEE
163views Visual Languages» more  VL 1992»
14 years 5 days ago
The Conversion of Diagrams to Knowledge Bases
If future electronic documents are to be truly useful, we must devise ways to automatically turn them into knowledgebases. In particular, we must be able to do this for diagrams. ...
Robert P. Futrelle
MODELS
2010
Springer
13 years 6 months ago
Transforming Process Models: Executable Rewrite Rules versus a Formalized Java Program
Abstract. In the business process management community, transformations for process models are usually programmed using imperative languages (such as Java). The underlying mapping ...
Pieter Van Gorp, Rik Eshuis
TCC
2007
Springer
100views Cryptology» more  TCC 2007»
14 years 2 months ago
Private Approximation of Clustering and Vertex Cover
Private approximation of search problems deals with finding approximate solutions to search problems while disclosing as little information as possible. The focus of this work is ...
Amos Beimel, Renen Hallak, Kobbi Nissim
ECCB
2005
IEEE
14 years 1 months ago
A query language for biological networks
Many areas of modern biology are concerned with the management, storage, visualization, comparison, and analysis of networks. For instance, networks are used to model signal trans...
Ulf Leser
TOG
2008
200views more  TOG 2008»
13 years 8 months ago
Improved seam carving for video retargeting
Video, like images, should support content aware resizing. We present video retargeting using an improved seam carving operator. Instead of removing 1D seams from 2D images we rem...
Michael Rubinstein, Ariel Shamir, Shai Avidan