Non-invasive high-resolution Chromatic White Light (CWL) measurement devices offer great potential for solving the challenge of latent fingerprints age determination. In this paper, we place 40 prints from different s...
详细信息
A lossless image secret sharing using a simple Boolean operation is proposed. The concept of visual cryptography in the secret sharing scheme is used to redesign a lossless secret sharing scheme. To ensure that the re...
详细信息
A lossless image secret sharing using a simple Boolean operation is proposed. The concept of visual cryptography in the secret sharing scheme is used to redesign a lossless secret sharing scheme. To ensure that the reconstructed image is the true secret image, an authentication mechanism is imported into the proposed scheme to verify whether the shadows are authentic before reconstructing the secret image. The proposed scheme delivers much more effective performance than Chen and Wu's scheme.
The paper elaborates on the concept of transformable boundary artifacts and their role in fostering knowledge-based work in cross-organization virtual communities of practice. The domain of investigation is clinical p...
详细信息
The paper elaborates on the concept of transformable boundary artifacts and their role in fostering knowledge-based work in cross-organization virtual communities of practice. The domain of investigation is clinical practice guidelines development for cancer. By reviewing the social worlds involved, we claim that guideline development is a boundary spanning activity which can be facilitated through social networking tools of a Guideline Management Information System. Such a system is then described, focusing on the way it appropriates `plasticity' to make guidelines cross social, institutional and technological boundaries. Contrasting earlier efforts, a key contribution of the research presented is that it emphasizes the dialogue and the intrinsic properties of developing (rather than interpreting) guidelines in collaborative settings.
The recent advances in Image Based Rendering (IBR) has pioneered a new technology, named Free-View Television (FTV), in which the viewers select freely the viewing position and angle of the transmitted multi-view vide...
详细信息
The recent advances in Image Based Rendering (IBR) has pioneered a new technology, named Free-View Television (FTV), in which the viewers select freely the viewing position and angle of the transmitted multi-view video. In Free-View Television, a person might record a personal video of this arbitrarily selected view and misuse this content, therefore, it is apparent that copyright and copy protection problems exist and should be solved for free- view TV. Among many alternative rights management methods, the copyright problem for visual data is approached by means of embedding hidden imperceptible information, called watermark, into the image and video content. In this paper, we focus on this problem by proposing a simple watermarking scheme. The watermark should not only be resistant to common video processing and multi-view video processing operations, it should also be extracted from a generated video for an arbitrary view. Based on this remark, we evaluate the performance of several watermarks according to their ability to survive in the new generated arbitrary view.
The emergence of HTML5 and other associated web technologies have turned browser applications to cross-platform and device independent ones. In particular HTML5, WebSockets and X3Dom can shape a diversity of future ap...
详细信息
While device technologies continue to shrink, the careful management of the signal integrity issues in Systems-on-Chip is becoming more important due to its impact to delay and power consumption. A class of two new ki...
详细信息
ISBN:
(纸本)9781424448388
While device technologies continue to shrink, the careful management of the signal integrity issues in Systems-on-Chip is becoming more important due to its impact to delay and power consumption. A class of two new kind of bus encoding schemes exhibiting temporal redundancy is proposed to cope with the energy and delay problems of long on-chip interconnects. They induce no wiring overhead and at the same time are independent from the bus bit width. These novel techniques achieve both to reduce switching activity and the probability of appearance of many crosstalk patterns and even eliminate them. On-chip interconnects in modern multi-core embedded systems with increasing complexity play a crucial role with regard to wiring overhead and power consumption. Contrary to the perception of limited value of bus encoding for SoCs, due to that they prove beneficial only for very long on-chip wires, designers can take advantage of these novel encodings schemes since, it is common to transfer data on-chip without continuous processing. Thus, data can be maintained in encoded format and hence, the designer does not need to consider the overhead imposed by the conversion to the original un-encoded format when transferring data over each intermediate hop.
In ubiquitous computing, data should be able to be accessed from any location, and the correctness of data becomes vital during the communication. Suppose that many users sign different messages respectively, before f...
详细信息
In ubiquitous computing, data should be able to be accessed from any location, and the correctness of data becomes vital during the communication. Suppose that many users sign different messages respectively, before forwarding or sending these messages, then the verifier must spend a lot of computing time to verify their signatures. Consequently, the aggregate signature scheme is an effective method of improving efficiency in this kind of systems, which provides the convenience for the verifier. In this paper, we propose a new certificateless aggregate signature scheme which is efficient in generating a signature and verification. This scheme is provably secure under the extended computational Diffie-Hellman assumption.
Modern mobile software and hardware is dominated by a paradox: while devices become smaller and services more resource- and energy-demanding, batteries almost maintain size and power. Among them, the multimedia applic...
详细信息
The present article reports on the second tool of a custom-built toolkit intended to train astronomers into simulating and visualizing the composite 3D structure of winds from hot close double stars by implementing a ...
详细信息
This paper propose an overlay interoperability technology for introducing the concept of Peer to peer (P2P) communications in the context of IP multimedia Subsystem (IMS) enabled interactive broadcasting networks (iDV...
详细信息
暂无评论