Sciweavers

5595 search results - page 4 / 1119
» Visualizing the shadows of Information
Sort
View
CCR
2005
115views more  CCR 2005»
13 years 8 months ago
Experiences from the SIGCOMM 2005 European shadow PC experiment
This note is an informal report about the Shadow Program Committee experiment that I organized for Sigcomm 2005. It (i) discusses the motivation for a Shadow Program Committee (PC...
Anja Feldmann
ICRA
2009
IEEE
130views Robotics» more  ICRA 2009»
14 years 3 months ago
Qualitative robot localisation using information from cast shadows
— Recently, cognitive psychologists and others have turned their attention to the formerly neglected study of shadows, and the information they purvey. These studies show that th...
Paulo Santos, Hannah M. Dee, Valquiria Fenelon
VISUALIZATION
2003
IEEE
14 years 1 months ago
Chameleon: An interactive texture-based rendering framework for visualizing three-dimensional vector fields
In this paper we present an interactive texture-based technique for visualizing three-dimensional vector fields. The goal of the algorithm is to provide a general volume renderin...
Guo-Shi Li, Udeepta Bordoloi, Han-Wei Shen
ICMCS
2007
IEEE
136views Multimedia» more  ICMCS 2007»
14 years 2 months ago
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image
Some (k, n)-threshold image secret sharing schemes encrypt the secret image into n noise-like shadow images with size 1/k times that of the original secret image. The small size o...
Ching-Nung Yang, Tse-Shih Chen
ACSAC
2008
IEEE
13 years 10 months ago
Preventing Information Leaks through Shadow Executions
A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer's server...
Roberto Capizzi, Antonio Longo, V. N. Venkatakrish...