In this paper we present a new technique for the display of High Dynamic Range (HDR) images on Low Dynamic Range (LDR) displays. The described process has three stages. First, the input image is segmented into luminan...
详细信息
Accurate perception of the size of 3D objects depicted on 2D desktop displays is important for many applications. Whether users perceive objects depicted on a display to be the same size as comparable real world objec...
详细信息
We present acoustic barcodes, structured patterns of physical notches that, when swiped with e. g., a fingernail, produce a complex sound that can be resolved to a binary ID. A single, inexpensive contact microphone a...
详细信息
ISBN:
(纸本)9781450315807
We present acoustic barcodes, structured patterns of physical notches that, when swiped with e. g., a fingernail, produce a complex sound that can be resolved to a binary ID. A single, inexpensive contact microphone attached to a surface or object is used to capture the waveform. We present our method for decoding sounds into IDs, which handles variations in swipe velocity and other factors. Acoustic barcodes could be used for information retrieval or to triggering interactive functions. They are passive, durable and inexpensive to produce. Further, they can be applied to a wide range of materials and objects, including plastic, wood, glass and stone. We conclude with several example applications that highlight the utility of our approach, and a user study that explores its feasibility.
Currently, embedded systems have been widely used for ubiquitous computing environments including digital setup boxes, mobile phones, and USN (Ubiquitous Sensor Networks). The significance of security has been growing...
详细信息
Currently, embedded systems have been widely used for ubiquitous computing environments including digital setup boxes, mobile phones, and USN (Ubiquitous Sensor Networks). The significance of security has been growing as it must be necessarily embedded in all these systems. Up until now, many researchers have made efforts to verify the integrity of applied binaries downloaded in embedded systems. The research of problem solving is organized into hardware methods and software-like methods. In this research, the basic approach to solving problems from the software perspective was employed. From the software perspective, unlike in the existing papers (Seshadri et al., Proc. the IEEE symposium on security and privacy, 2004;Seshadri et al., Proc. the symposium on operating systems principals, 2005) based on the standardized model (TTAS. KO-11.0054. http://***2006) publicized in Korea, there is no extra verifier and conduct for the verification function in the target system. Contrary to the previous schemes (Jung et al. http://***/PDFData/23-1_001_***, 2008;Lee et al., LNCS, vol. 4808, pp. 346-355, 2007), verification results are stored in 1 validation check bit, instead of storing signature value for application binary files in the i-node structure for the purpose of reducing run-time execution overhead. Consequently, the proposed scheme is more efficient because it dramatically reduces overhead in storage space, and when it comes to computing, it performs one hash algorithm for initial execution and thereafter compares 1 validation check bit only, instead of signature and hash algorithms for every application binary. Furthermore, in cases where there are frequent changes in the i-node structure or file data depending on the scheme application, the scheme can provide far more effective verification performance compared to the previous schemes.
Massively parallel Graphics Processing Unit (GPU) hardware has become increasingly powerful, available and affordable. Software tools have also advanced to the point that programmers can write general purpose parallel...
详细信息
The development of complex applications is one of the major current challenges of Ubiquitous computing. Such applications are difficult to develop because they use services provided by different context-provision midd...
详细信息
The proceedings contain 294 papers. The topics discussed include: raster image representation of fingerprint minutiae;fusion in fingerprint authentication: two finger types vs. two scanner types;keystroke dynamics aut...
ISBN:
(纸本)9781450301138
The proceedings contain 294 papers. The topics discussed include: raster image representation of fingerprint minutiae;fusion in fingerprint authentication: two finger types vs. two scanner types;keystroke dynamics authentication for mobile phones;random forgery attacks against DTW-based online signature verification algorithm;a location-aware rogue AP detection system based on wireless packet sniffing of sensor APs;a model transformation approach for verifying multi-agent systems using spin;tagging web product titles based on hidden Markov model;a pattern-based verification approach for a multi-core system development;an approach of creative application evolution on cloud computing platform;change impact analysis for object-oriented programs evolved to aspect-oriented programs;harmonic functions based semi-supervised learning for web spam detection;and efficient clustering of populations using a minimal SNP panel.
暂无评论