• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,530
Next 10 →

Visual Cryptography

by Moni Naor , Adi Shamir - A PRELIMINARY VERSION OF THIS PAPER APPEARED IN EUROCRYPT 94.
"... In this paper we consider a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations. The scheme is perfectly secure and very easy to implement. We extend it into a visual variant ofthek out of n secret sharing problem, in which a dealer provides a t ..."
Abstract - Cited by 327 (4 self) - Add to MetaCart
In this paper we consider a new type of cryptographic scheme, which can decode concealed images without any cryptographic computations. The scheme is perfectly secure and very easy to implement. We extend it into a visual variant ofthek out of n secret sharing problem, in which a dealer provides a

Transparent Robust Image Watermarking

by Mitchell D. Swanson, Bin Zhu, Ahmed H. Tewfik , 1996
"... We propose a watermarking scheme to hide copyright information in an image. The scheme employs visual masking to guarantee that the embedded watermark is invisible and to maximize the robustness of the hidden data. The watermark is constructed for arbitrary image blocks by filtering a pseudo-noise s ..."
Abstract - Cited by 129 (4 self) - Add to MetaCart
We propose a watermarking scheme to hide copyright information in an image. The scheme employs visual masking to guarantee that the embedded watermark is invisible and to maximize the robustness of the hidden data. The watermark is constructed for arbitrary image blocks by filtering a pseudo

Manetho: Transparent Rollback-Recovery with Low Overhead, Limited Rollback and Fast Output Commit

by Elmootazbellah N. Elnozahy, Willy Zwaenepoel - IEEE TRANSACTIONS ON COMPUTERS , 1992
"... Manetho is a new transparent rollback-recovery protocol for long-running distributed computations. It uses a novel combination of antecedence graph maintenance, uncoordinated checkpointing, and sender-based message logging. Manetho simultaneously achieves the advantages of pessimistic message loggin ..."
Abstract - Cited by 209 (11 self) - Add to MetaCart
Manetho is a new transparent rollback-recovery protocol for long-running distributed computations. It uses a novel combination of antecedence graph maintenance, uncoordinated checkpointing, and sender-based message logging. Manetho simultaneously achieves the advantages of pessimistic message

A practical, voter-verifiable election scheme

by David Chaum, Peter Y A Ryan, Steve Schneider - In European Symp. on Research in Computer Security, number 3679 in LNCS , 2005
"... Abstract. We present an election scheme designed to allow voters to verify that their vote is accurately included in the tabulation. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording ..."
Abstract - Cited by 175 (51 self) - Add to MetaCart
Abstract. We present an election scheme designed to allow voters to verify that their vote is accurately included in the tabulation. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote

An Implementation of Transparent Migration on Standard Scheme

by Eijiro Sumii - Department of Computer Science, Rice University , 2000
"... I present a handy (though somewhat restrictive) way to implement mobile computation a la Telescript on top of standard Scheme. Background. Mobile computation is an ecient and eective approach to distributed programming where a program works by migrating from one host to another. The migration is ca ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
implementations (to my knowledge) of transparent migration need either a custom runtime system (e.g. [13]) or global source code transformation (e.g. [12]). Our Method. In this presentation, I describe a library to enable transparent migration in standard Scheme. Unlike existing implementations, it requires

TRANSPARENT COMPRESSION SCHEME FOR LINUX FILE

by N C L E Am, M. A. Basir, M. H. Yousaf , 2012
"... Data footprint in data centers is growing day by day. Servers being used in research institutions, commercial web hosting companies and other enterprise server environment are now dealing with more and more bytes. Most of these servers have Linux operating systems and Ext2/3 comes as default file sy ..."
Abstract - Add to MetaCart
system in latest Linux kernel. A high-end compression system could be introduced in Ext2/3. It will be helpful in reducing data footprint in Linux based server environment. With slight modifications and using the sparse block feature of Ext2/3 file system transparent compression could be achieved

On Transparency in Organizations

by unknown authors , 2011
"... Should workers be informed of the incentive schemes governing their team co-workers? Should workers be told on which performance measure they will be as-sessed? Should workers be told how important the tasks are for the organization? This paper shows in an abstract moral hazard setup why in rich eno ..."
Abstract - Add to MetaCart
Should workers be informed of the incentive schemes governing their team co-workers? Should workers be told on which performance measure they will be as-sessed? Should workers be told how important the tasks are for the organization? This paper shows in an abstract moral hazard setup why in rich

On Transparency in Organizations

by unknown authors , 2011
"... Should workers be informed of the incentive schemes governing their team co-workers? Should workers be told on which performance measure they will be as-sessed? Should workers be told detailed statistics about workersattitudes in the past? This paper shows in an abstract moral hazard setup why in ri ..."
Abstract - Add to MetaCart
Should workers be informed of the incentive schemes governing their team co-workers? Should workers be told on which performance measure they will be as-sessed? Should workers be told detailed statistics about workersattitudes in the past? This paper shows in an abstract moral hazard setup why

Perceptual Watermarks for Digital Images and Video

by Raymond B. Wolfgang, Christine I. Podilchuk, Edward J. Delp , 2007
"... The growth of new imaging technologies has created a need for techniques that can be used for copyright protection of digital images. Copyright protection involves the authentication of image content and/or ownership and can be used to identify illegal copies of a (possibly forged) image. One approa ..."
Abstract - Cited by 192 (21 self) - Add to MetaCart
sense, any watermarking technique that attempts to incorporate an invisible mark into an image is perceptually based. However, in order to provide transparency (invisibility of the watermark) and robustness to attack, more sophisticated use of perceptual information in the watermarking process

Optimization of Mesh Locality for Transparent Vertex Caching

by Hugues Hoppe
"... Bus traffic between the graphics subsystem and memory can become a bottleneck when rendering geometrically complex meshes. In this paper, we investigate the use of vertex caching to transparently reduce geometry bandwidth. Use of an indexed triangle strip representation permits application programs ..."
Abstract - Cited by 79 (0 self) - Add to MetaCart
Bus traffic between the graphics subsystem and memory can become a bottleneck when rendering geometrically complex meshes. In this paper, we investigate the use of vertex caching to transparently reduce geometry bandwidth. Use of an indexed triangle strip representation permits application programs
Next 10 →
Results 1 - 10 of 1,530
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University