|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1273 occurrences of 947 keywords
|
|
|
Results
Found 4591 publication records. Showing 4591 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
121 | Yevgeniy Dodis, Moti Yung |
Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Security in Storage Workshop ![In: Proceedings of the First International IEEE Security in Storage Workshop, SISW 2002, Greenbelt, Maryland, USA, December 11, 2002, pp. 45-52, 2002, IEEE Computer Society, 0-7695-1888-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
cryptographic key storage, key storage protection, gradual key exposure, exposure resilience, key redundancy, hierarchical id-based encryption, bi-linear Diffie-Hellman |
100 | B. D. Cook, Soo-Young Lee |
Fast exposure simulation for large circuit patterns in electron beam lithography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings 1995 International Conference on Image Processing, Washington, DC, USA, October 23-26, 1995, pp. 442-445, 1995, IEEE Computer Society, 0-8186-7310-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
electron beam lithography, proximity effect (lithography), fast exposure simulation, large circuit patterns, electron beam lithography, global exposure, local exposure, proximity effect, simulation |
79 | Giacomino Veltri, Qingfeng Huang, Gang Qu 0001, Miodrag Potkonjak |
Minimal and maximal exposure path algorithms for wireless embedded sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SenSys ![In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys 2003, Los Angeles, California, USA, November 5-7, 2003, pp. 40-50, 2003, ACM, 1-58113-707-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
centralized optimal algorithms, wireless embedded sensor networks, simulation, localized algorithms |
72 | Bang Wang, Kee Chaing Chua, Wei Wang 0002, Vikram Srinivasan |
Worst and Best Information Exposure Paths in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings, pp. 52-62, 2005, Springer, 3-540-30856-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
66 | Chen Ling, Lesheng Hua |
Effect of Aircraft Datablock Complexity and Exposure Time on Performance of Change Detection Task. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (17) ![In: Engineering Psychology and Cognitive Ergonomics, 8th International Conference, EPCE 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 554-563, 2009, Springer, 978-3-642-02727-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Air traffic control display, change detection task, complexity of datablock, exposure time |
66 | Paul Camion, Jacques Patarin |
t-resilient functions and the partial exposure problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 19(2), pp. 99-133, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Exposure-Resilient Function, Wire-tapping, Correlation-immune functions, Nonlinear codes, Binary channel, Symmetric encryption scheme, (n, k, t)-scheme, Linear codes, Orthogonal arrays, Resilient function, Secret key |
66 | Jaymie R. Meliker, Melissa J. Slotnick, Gillian A. AvRuskin, Andrew M. Kaufmann, Geoffrey M. Jacquez, Jerome O. Nriagu |
Improving exposure assessment in environmental epidemiology: Application of spatio-temporal visualization tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Geogr. Syst. ![In: J. Geogr. Syst. 7(1), pp. 49-66, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Arsenic, STIS, GIS, Epidemiology, exposure |
64 | Seapahn Meguerdichian, Farinaz Koushanfar, Gang Qu 0001, Miodrag Potkonjak |
Exposure in wireless Ad-Hoc sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: MOBICOM 2001, Proceedings of the seventh annual international conference on Mobile computing and networking, Rome, Italy, July 16-21, 2001., pp. 139-150, 2001, ACM, 1-58113-422-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
63 | György Thuróczy, Ferenc Molnár, Gábor Jánossy, Noémi Nagy, Györgyi Kubinyi, József Bakos, Judit Szabó |
Personal RF exposimetry in urban area. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 63(1-2), pp. 87-96, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Radiofrequency radiation, Public exposure, Personal exposimetry, Urban area |
58 | Nadège Varsier, Kanako Wake, Masao Taki, Soichi Watanabe, Toru Takebayashi, Naohito Yamaguchi, Yuriko Kikuchi |
SAR characterization inside intracranial tumors for case-control epidemiological studies on cellular phones and RF exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 63(1-2), pp. 65-78, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SAR characterization, Epidemiological study, RF exposure, Cancer risk, Mobile phones, Brain tumors |
58 | Mohamed Khalifa 0001, Sammi K. N. Cheng |
Adoption of Mobile Commerce: Role of Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 46, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Adoption, Mobile Commerce, Exposure |
56 | Chris Aimone, Steve Mann 0001 |
Camera Response Function Recovery from Auto-Exposure Cameras. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (4) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 233-236, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Eric P. Bennett, Leonard McMillan |
Video enhancement using per-pixel virtual exposures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 24(3), pp. 845-852, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
low dynamic range, restoration, noise reduction, digital video, tone mapping, bilateral filter, exposure |
53 | Bertil R. R. Persson, Leif G. Salford, Arne Brun |
Blood-brain barrier permeability in rats exposed to electromagnetic fields used in wireless communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 3(6), pp. 455-461, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
50 | Keld Raaschou, Austen W. Rainer |
Exposure model for prediction of number of customer reported defects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEM ![In: Proceedings of the Second International Symposium on Empirical Software Engineering and Measurement, ESEM 2008, October 9-10, 2008, Kaiserslautern, Germany, pp. 306-308, 2008, ACM, 978-1-59593-971-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
estimation of field defects, exposure model, prediction |
50 | Wei Gao 0007, Xueli Wang, Dongqing Xie |
Chameleon Hashes Without Key Exposure Based on Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(1), pp. 109-113, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
chameleon signature, key-exposure, chameleon hash |
49 | Pei-Shan Liu, Ren-Ming Yang, Yin-Mei Chiung, Chung-Yong Liu |
Health Risk Estimation of Dichlorobenzene Exposure Workers by Using Computer Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (9) ![In: Human Interface and the Management of Information. Interacting in Information Environments, Symposium on Human Interface 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part II, pp. 1060-1066, 2007, Springer, 978-3-540-73353-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
1 and 4-dichlorobenzene, anti-apoptosis, staurosporine, Pearson correlation analysis, apoptosis |
49 | Hristo N. Djidjev |
Efficient Computation of Minimum Exposure Paths in a Sensor Network Field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCOSS ![In: Distributed Computing in Sensor Systems, Third IEEE International Conference, DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings, pp. 295-308, 2007, Springer, 978-3-540-73089-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai |
Exposure-Resilient Functions and All-or-Nothing Transforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, pp. 453-469, 2000, Springer, 3-540-67517-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
48 | Alastair McKinlay |
Emerging EMF technologies action on possible health risks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 63(1-2), pp. 5-9, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Health risks, European projects, Exposure, Electromagnetic fields |
48 | Ran Canetti, Shai Halevi, Jonathan Katz |
A Forward-Secure Public-Key Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 255-271, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Bilinear Diffie-Hellman, Encryption, Forward security, Key exposure |
46 | Won-ho Cho, Ki-Sang Hong |
Extending Dynamic Range of Two Color Images under Different Exposures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (4) ![In: 17th International Conference on Pattern Recognition, ICPR 2004, Cambridge, UK, August 23-26, 2004., pp. 853-856, 2004, IEEE Computer Society, 0-7695-2128-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Steve Mann 0001, Corey Manders, James Fung |
Painting with looks: photographic images from video using quantimetric processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 10th ACM International Conference on Multimedia 2002, Juan les Pins, France, December 1-6, 2002., pp. 117-126, 2002, ACM, 1-58113-620-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
comparametric equations, comparametrics, multiple exposures, image processing, video |
46 | Steve Mann 0001, Richard Mann |
Quantigraphic Imaging: Estimating the camera response and exposures from differently exposed images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR (1) ![In: 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2001), with CD-ROM, 8-14 December 2001, Kauai, HI, USA, pp. 842-849, 2001, IEEE Computer Society, 0-7695-1272-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
43 | Kai Xiong, Zhen Xiang, Jianhong Ge |
Evaluation of the Human Eye Glare after Strong Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMEI (1) ![In: Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, BMEI 2008, May 28-30, 2008, Sanya, Hainan, China - Volume 1, pp. 660-663, 2008, IEEE Computer Society, 978-0-7695-3118-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Glare, Glare evaluation, Recovery time, Strong exposure |
43 | KeBo Deng, Zhong Liu |
Minimum Path Exposure and Detection Interval Setting for Target Detection Using Wireless Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Wirel. Inf. Networks ![In: Int. J. Wirel. Inf. Networks 14(4), pp. 289-294, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Detection interval, Dijkstra’s algorithm, Path exposure, Value fusion, Sensor networks |
43 | Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li |
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, 4th International Conference, TAMC 2007, Shanghai, China, May 22-25, 2007, Proceedings, pp. 148-158, 2007, Springer, 978-3-540-72503-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure |
43 | Liusheng Huang, Hongli Xu, Yang Wang 0015, Junmin Wu, Hong Li |
Coverage and Exposure Paths in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 21(4), pp. 490-495, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
wireless sensor networks, coverage, localized algorithm, exposure |
41 | Marius Zimand |
Exposure-Resilient Extractors and the Derandomization of Probabilistic Sublinear Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Complex. ![In: Comput. Complex. 17(2), pp. 220-253, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Subject classification, 68Q15 |
41 | Neil Barakat, Thomas E. Darcie, A. Nicholas Hone |
The tradeoff between SNR and exposure-set size in HDR imaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 1848-1851, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Ramesh Raskar, Amit K. Agrawal, Jack Tumblin |
Coded exposure photography: motion deblurring using fluttered shutter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 25(3), pp. 795-804, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Dong Sik Kim, Su Yeon Lee, Kiryung Lee |
Joint Optimization of Image Registration and Comparametric Exposure Compensation Based on the Lucas-Kanade Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (3) ![In: 18th International Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, Hong Kong, China, pp. 905-908, 2006, IEEE Computer Society, 0-7695-2521-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Peerly Setter, Hadas Marciano, Joel Norman, Michal Hovev |
The effects of time limitations on target identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCE ![In: Proceedings of the 14th European Conference on Cognitive Ergonomics: invent! explore!, ECCE 2007, London, UK, August 28-31, 2007, pp. 301-302, 2007, ACM, 978-1-84799-849-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
intuitive decision making, limited exposure duration, identification, image interpretation |
40 | James Nol, Godfrey Isouard, Jerzy Mirecki |
Digital Repeat Analysis; Setup and Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 19(2), pp. 159-166, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
digital reject analysis, equipment use, repeat analysis, exposure selection, positioning and techniques, education, CR, PACS |
40 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Xiangxue Li |
Identity-Based Key-Insulated Signature with Secure Key-Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 13-26, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Key-Insulated, Bilinear Pairings, Identity-Based Signature, Key-Exposure |
40 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma |
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 409-423, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Parallel Key-Insulation, Bilinear Pairings, Identity-Based Encryption, Key-Exposure |
40 | Veradej Phipatanasuphorn, Parameswaran Ramanathan |
Vulnerability of Sensor Networks to Unauthorized Traversal and Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 53(3), pp. 364-369, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
sensor exposure problem, Wireless ad hoc networks, sensor deployment |
38 | Taemin Kim, Ara V. Nefian, Michael Broxton |
Photometric Recovery of Ortho-Images Derived from Apollo 15 Metric Camera Imagery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVC (1) ![In: Advances in Visual Computing, 5th International Symposium, ISVC 2009, Las Vegas, NV, USA, November 30 - December 2, 2009, Proceedings, Part I, pp. 700-709, 2009, Springer, 978-3-642-10330-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Alison M. Tollner, Michael A. Riley, Gerald Matthews, Kevin D. Shockley |
Divided attention during adaptation to visual-motor rotation in an endoscopic surgery simulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 7(1), pp. 6-13, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Perceptual-motor skill, Simulation, Learning curve, Endoscopy, Divided attention |
38 | Yoon Hyuk Kim, Won Man Park |
Use of Simulation Technology for Prediction of Radiation Dose in Nuclear Power Plant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational and Information Science, First International Symposium, CIS 2004, Shanghai, China, December 16-18, 2004, Proceedings, pp. 413-418, 2004, Springer, 3-540-24127-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Michael D. Grossberg, Shree K. Nayar |
What Can Be Known about the Radiometric Response from Images? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCV (4) ![In: Computer Vision - ECCV 2002, 7th European Conference on Computer Vision, Copenhagen, Denmark, May 28-31, 2002, Proceedings, Part IV, pp. 189-205, 2002, Springer, 3-540-43748-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
38 | Henry Lai, Monserrat Carino, Narendra Singh |
Naltrexone blocks RFR-induced DNA double strand breaks in rat brain cells. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 3(6), pp. 471-476, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
35 | Yoshinori Aono |
A New Lattice Construction for Partial Key Exposure Attack for RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 34-53, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
partial key exposure attack, the Coppersmith technique, cryptanalysis, RSA, lattice basis reduction |
35 | Tommi Alanko, Maila Hietanen, Patrick von Nandelstadh |
Occupational exposure to RF fields from base station antennas on rooftops. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 63(1-2), pp. 125-132, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Occupational exposure, RF fields, Mobile phone antenna, Base station |
35 | Ben De Prisco, Ian Iscoe, Alexander Y. Kreinin, Ahmed Nagi |
A semi-analytical method for VaR and credit exposure analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 152(1), pp. 23-47, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Portfolio distribution, Credit exposure, Portfolio compression, Large deviations, Value-at-Risk |
35 | Yu Chen 0005, Lars Henning Pedersen, Wesley W. Chu, Jorn Olsen |
Drug exposure side effects from mining pregnancy data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 9(1), pp. 22-29, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
epidemiology data analysis, side effect of drug exposure, association rule mining |
35 | Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 |
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 18-30, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
On-line/off-line signatures, Key exposure, Chameleon hashing |
35 | Mihir Bellare, Adriana Palacio |
Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 16(6), pp. 379-396, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Key update, Encryption, Identity-based encryption, Key exposure |
35 | Ellen Jochemsz, Benne de Weger |
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 203-216, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
partial key exposure, inhomogeneous diophantine approximation, cryptanalysis, RSA, lattice basis reduction |
35 | Amit K. Agrawal, Ramesh Raskar, Shree K. Nayar, Yuanzhen Li |
Removing photography artifacts using gradient projection and flash-exposure sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 24(3), pp. 828-835, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
flash-exposure sampling, high dynamic range (HDR) imaging, reflection removal, flash, gradient projection |
35 | Christian Theobalt, Irene Albrecht, Jörg Haber, Marcus A. Magnor, Hans-Peter Seidel |
Pitching a baseball: tracking high-speed motion with multi-exposure images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 23(3), pp. 540-547, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
high-speed motion capture, multi-exposure images, physically based validation, pitching and flight of baseball |
35 | Martijn J. Schuemie |
Effect of an external viewpoint on therapist performance in virtual reality exposure therapy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, CHI 2002, Minneapolis, Minnesota, USA, April 20-25, 2002, pp. 834-835, 2002, ACM, 1-58113-454-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
exposure therapy, virtual reality, navigation, frame of reference |
35 | Yashwant K. Malaiya, Anneliese von Mayrhauser, Pradip K. Srimani |
An Examination of Fault Exposure Ratio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 19(11), pp. 1087-1094, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
fault exposure ratio, per-fault hazard rate, detectability profile, logarithmic model, predictive capability, fault density, software testing, software reliability, software reliability, program testing |
34 | Brenda K. Wiederhold, Mark D. Wiederhold |
Virtual reality with fMRI: a breakthrough cognitive treatment tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Virtual Real. ![In: Virtual Real. 12(4), pp. 259-267, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Posttraumatic stress disorder, Cue exposure, Exposure therapy, Virtual reality, fMRI, Physiology, Brain imaging |
33 | Vincenzo Caglioti, Alessandro Giusti |
Basic Video-Surveillance with Low Computational and Power Requirements Using Long-Exposure Frames. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIVS ![In: Advanced Concepts for Intelligent Vision Systems, 10th International Conference, ACIVS 2008, Juan-les-Pins, France, October 20-24, 2008. Proceedings, pp. 218-229, 2008, Springer, 978-3-540-88457-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Stefan W. Roeder, Matthias Richter, Olf Herbarth |
Application of mnSOM on Linking External Exposure to Internal Load. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (2) ![In: Advances in Neuro-Information Processing, 15th International Conference, ICONIP 2008, Auckland, New Zealand, November 25-28, 2008, Revised Selected Papers, Part II, pp. 816-823, 2008, Springer, 978-3-642-03039-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Seon Joo Kim, Jan-Michael Frahm, Marc Pollefeys |
Joint Feature Tracking and Radiometric Calibration from Auto-Exposure Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCV ![In: IEEE 11th International Conference on Computer Vision, ICCV 2007, Rio de Janeiro, Brazil, October 14-20, 2007, pp. 1-8, 2007, IEEE Computer Society, 978-1-4244-1630-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Jacques Philippe Sauvé, Rodrigo A. Santos, Rodrigo R. Almeida, José Antão Beltrão Moura |
On the Risk Exposure and Priority Determination of Changes in IT Service Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Managing Virtualization of Networks and Services, 18th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2007, San José, CA, USA, October 29-31, 2007, Proceedings, pp. 147-158, 2007, Springer, 978-3-540-75693-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Change Prioritization, Risk, Change Management, IT Service Management, Business-Driven IT Management |
33 | YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won |
A PKI System for Detecting the Exposure of a User's Secret Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 248-250, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
key-insulated signature, one-time hash chain, NOVOMODO |
33 | Robert Pellerin, Gilbert Babin, Pierre-Majorique Léger, Kim St-Georges |
Enterprise Resource Planning Diffusion: Measuring the Impact of Network Exposure and Power. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEA ![In: Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28 - November 2, 2006, Papeete, Tahiti, French Polynesia, pp. 9, 2006, IEEE Computer Society, 0-7695-2703-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
adaoption, ERP, diffusion, interlocking |
33 | Wen-Chung Kao, Chien-Chih Hsu, Chih-Chung Kao, Shou-Hung Chen |
Adaptive exposure control and real-time image fusion for surveillance systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece, 2006, IEEE, 0-7803-9389-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Alejandro J. Troccoli, Sing Bing Kang, Steven M. Seitz |
Multi-View Multi-Exposure Stereo. ![Search on Bibsonomy](Pics/bibsonomy.png) |
3DPVT ![In: 3rd International Symposium on 3D Data Processing, Visualization and Transmission (3DPVT 2006), 14-16 June 2006, Chapel Hill, North Carolina, USA, pp. 861-868, 2006, IEEE Computer Society, 978-0-7695-2825-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Dan B. Goldman, Jiun-Hung Chen |
Vignette and Exposure Calibration and Compensation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCV ![In: 10th IEEE International Conference on Computer Vision (ICCV 2005), 17-20 October 2005, Beijing, China, pp. 899-906, 2005, IEEE Computer Society, 0-7695-2334-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Chris Chambers, Wu-chang Feng, Wu-chi Feng, Debanjan Saha |
Mitigating information exposure to cheaters in real-time strategy games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOSSDAV ![In: Network and Operating System Support for Digital Audio and Video, 15th International Workshop, NOSSDAV 2005, Stevenson, Washington, USA, June 13-14, 2005, Proceedings, pp. 7-12, 2005, ACM, 1-58113-987-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
peer-to-peer, games, cheating |
33 | Zile Wei, Yu Cao, A. Richard Newton |
Digital Image Restoration by Exposure-Splitting and Registration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (4) ![In: 17th International Conference on Pattern Recognition, ICPR 2004, Cambridge, UK, August 23-26, 2004., pp. 657-660, 2004, IEEE Computer Society, 0-7695-2128-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Jingyuan Zhang, Guangbin Fan |
A Cellular Network Planning Technique to Minimize Exposure to RF Radiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 15-18 August 2004, Montreal, Quebec, Canada, pp. 338-344, 2004, IEEE Computer Society, 0-7695-2198-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Giuseppe Ateniese, Breno de Medeiros |
On the Key Exposure Problem in Chameleon Hashes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 165-179, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Frank M. Candocia |
Simultaneous homographic and comparametric alignment of multiple exposure-adjusted pictures of the same scene. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 12(12), pp. 1485-1494, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Johannes Blömer, Alexander May 0001 |
New Partial Key Exposure Attacks on RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 27-43, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Yevgeniy Dodis, Amit Sahai, Adam D. Smith |
On Perfect and Adaptive Security in Exposure-Resilient Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 301-324, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Matthew Uyttendaele, Ashley Eden, Richard Szeliski |
Eliminating Ghosting and Exposure Artifacts in Image Mosaics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR (2) ![In: 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2001), with CD-ROM, 8-14 December 2001, Kauai, HI, USA, pp. 509-516, 2001, IEEE Computer Society, 0-7695-1272-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Min Y. Mun, Sasank Reddy, Katie Shilton, Nathan Yau, Jeff Burke, Deborah Estrin, Mark H. Hansen, Eric Howard, Ruth West, Péter Boda |
PEIR, the personal environmental impact report, as a platform for participatory sensing systems research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (MobiSys 2009), Kraków, Poland, June 22-25, 2009, pp. 55-68, 2009, ACM, 978-1-60558-566-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
environmental impact and exposure, location data, mobile system, participatory sensing |
32 | Christine Sutter |
How Users with RSI Review the Usability of Notebook Input Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (17) ![In: Ergonomics and Health Aspects of Work with Computers, International Conference, EHAWC 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, pp. 319-328, 2007, Springer, 978-3-540-73332-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Musculoskeletal Discomfort, Notebook Input Device, Exposure, RSI |
32 | Brian E. Weeks, Daniel S. Lane, Dam Hee Kim, Slgi S. Lee, Nojin Kwak |
Incidental Exposure, Selective Exposure, and Political Information Sharing: Integrating Online Exposure Patterns and Expression on Social Media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Mediat. Commun. ![In: J. Comput. Mediat. Commun. 22(6), pp. 363-379, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
31 | Edouard Laroche, Shingo Kagami |
Dynamical models for position measurement with global shutter and rolling shutter cameras. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, October 11-15, 2009, St. Louis, MO, USA, pp. 5204-5209, 2009, IEEE, 978-1-4244-3803-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Andrew B. Kahng |
How to get real mad. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPD ![In: Proceedings of the 2008 International Symposium on Physical Design, ISPD 2008, Portland, Oregon, USA, April 13-16, 2008, pp. 69, 2008, ACM, 978-1-60558-048-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
design-aware manufacturing, integrated circuit physical design, manufacturing-aware design, performance analysis, design for manufacturability |
31 | Ahmad Abdel-Aziz Sharieh, Gianluca Elia |
Toward International Multi-sign Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 1-5 September 2008, Turin, Italy, pp. 622-625, 2008, IEEE Computer Society, 978-0-7695-3299-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Multi-Sign Languages |
31 | Aurel Cami, Garrick L. Wallstrom, William R. Hogan |
Integrating a Commuting Model with the Bayesian Aerosol Release Detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BioSecure ![In: Biosurveillance and Biosecurity, International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings, pp. 85-96, 2008, Springer, 978-3-540-89745-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
BARD, anthrax, commuting, biosurveillance |
31 | Christos Efstratiou, Nigel Davies 0001, Gerd Kortuem, Joe Finney, Rob Hooper, Mark Lowton |
Experiences of designing and deploying intelligent sensor nodes to monitor hand-arm vibrations in the field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan, Puerto Rico, June 11-13, 2007, pp. 127-138, 2007, ACM, 978-1-59593-614-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hand-arm vibration, health and safety, ad-hoc networks, embedded systems, deployment, mobile systems |
31 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
Identity Based Key Insulated Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 226-234, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Boris Dragovic, Calicrates Policroniades |
Information SeeSaw: Availability vs. Security Management in the UbiComp World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005, Proceedings, pp. 200-216, 2005, Springer, 3-540-28798-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Manoj Aggarwal, Narendra Ahuja |
Split Aperture Imaging for High Dynamic Range. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Vis. ![In: Int. J. Comput. Vis. 58(1), pp. 7-17, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
beam splitting, multiple sensors, video-rate imaging, split aperture imaging, high dynamic range |
31 | Leif G. Salford, Arne Brun, Bertil R. R. Persson |
Brain tumour development in rats exposed to electromagnetic fields used in wireless cellular communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 3(6), pp. 463-469, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
28 | Zhong Yuan Li, Sung-Keun Song, Sukjung Yong, Hee Yong Youn |
Private and Secure Service Discovery Using Incrementally Progressive Exposure and Random Match. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 2447-2454, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
progressive exposure, privacy, Pervasive computing, service discovery |
28 | Ali Erkan, Sam Newmark, Nicolas Ommen |
Exposure to research through replication of research: a case in complex networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 14th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2009, Paris, France, July 6-9, 2009, pp. 114-118, 2009, ACM, 978-1-60558-381-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
research exposure, complex networks, scale free networks, random networks |
28 | Jeffrey D. Russell, Charles R. Kime |
System Fault Diagnosis: Masking, Exposure, and Diagnosability Without Repair. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 24(12), pp. 1155-1161, 1975. The full citation details ...](Pics/full.jpeg) |
1975 |
DBLP DOI BibTeX RDF |
Closure index, diagnosable digital systems, diagnostic modeling, exposure index, masking index, fault diagnosis, fault-tolerant computing, multiple faults |
26 | Feng Zhu 0010, Wei Zhu |
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Seventh Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009, 9-13 March 2009, Galveston, TX, USA, pp. 1-8, 2009, IEEE Computer Society, 978-1-4244-3304-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Alaa Aref El Masri, João Pedro Sousa |
Limiting Private Data Exposure in Online Transactions: A User-Based Online Privacy Assurance Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 438-443, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Marco Block, Maxim Schaubert, Fabian Wiesel, Raúl Rojas 0001 |
Multi-Exposure Document Fusion Based on Edge-Intensities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 10th International Conference on Document Analysis and Recognition, ICDAR 2009, Barcelona, Spain, 26-29 July 2009, pp. 136-140, 2009, IEEE Computer Society, 978-0-7695-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Francesco Banterle, Paolo Banterle |
Æ-HDR: an automatic exposure framework for high dynamic range content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGGRAPH Posters ![In: International Conference on Computer Graphics and Interactive Techniques, SIGGRAPH 2008, Los Angeles, California, USA, August 11-15, 2008, Poster Proceedings, pp. 58, 2008, ACM, 978-1-60558-466-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
tone mapping, high dynamic range imaging |
26 | Yolanta Beres, Jonathan Griffin, Simon Shiu, Max Heitman, David Markle, Peter Ventura |
Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 33-42, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Liang Liu 0001, Xi Zhang 0005, Huadong Ma |
Percolation-theory based density derivations of wireless sensor network nodes for preventing exposure paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISS ![In: 42nd Annual Conference on Information Sciences and Systems, CISS 2008, Princeton, NJ, USA, 19-21 March 2008, pp. 836-841, 2008, IEEE, 978-1-4244-2246-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | David S. Lalush |
Binary Matrices for Multiplexed X-Ray Imaging: Constant-Time and Constant-Exposure Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISBI ![In: Proceedings of the 2007 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, Washington, DC, USA, April 12-16, 2007, pp. 548-551, 2007, IEEE, 1-4244-0672-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Helene Schulerud, Jens T. Thielemann, Trine Kirkhus, Kristin Kaspersen, Joar M. Østby, Marinos G. Metaxas, Gary J. Royle, Jennifer Griffiths, Emily Cook, Colin Esbrand, Silvia Pani, Cristian Venanzi, Paul F. van der Stelt, Gang Li, Renato Turchetta, Andrea Fant, Sergios Theodoridis, Harris V. Georgiou, Geoff Hall, Matthew Noy, John Jones, James Leaver, Frixos Triantis, Asimakis Asimidis, Nikos Manthos, Renata Longo, Anna Bergamaschi, Robert D. Speller |
Adaptive Image Content-Based Exposure Control for Scanning Applications in Radiography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIVS ![In: Advanced Concepts for Intelligent Vision Systems, 9th International Conference, ACIVS 2007, Delft, The Netherlands, August 28-31, 2007, Proceedings, pp. 543-552, 2007, Springer, 978-3-540-74606-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Adaptive X-ray imaging, encephalographic imaging, image correction, mammography |
26 | Bruno Herbelin, Helena Grillon, Pablo de Heras Ciechomski, Daniel Thalmann |
Coding gaze tracking data with chromatic gradients for VR Exposure Therapy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAT ![In: Advances in Artificial Reality and Tele-Existence, 17th International Conference on Artificial Reality and Telexistence, ICAT 2007, Esbjerg, Denmark, November 28-30, 2007, Proceedings, pp. 7-14, 2007, IEEE Computer Society, 0-7695-3056-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Pedro M. Q. Aguiar |
Unsupervised Simultaneous Registration and Exposure Correction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 361-364, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Jeanne B. Funk |
Exposure to Violent Video Games and Desensitization to Violence in Children and Adolescents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Entertainment Computing - ICEC 2006, 5th International Conference, Cambridge, UK, September 20-22, 2006, Proceedings, pp. 96-102, 2006, Springer, 3-540-45259-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Violence, Desensitization, Children, Video Games, Adolescents |
26 | Holger Regenbrecht, Daniel Wickeroth, Brian Dixon, Stefan Müller 0002 |
Collaborative Mixed Reality Exposure Therapy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 5th International Conference on Cyberworlds (CW 2006), 28-29 November 2006, Lausanne, Switzerland, pp. 25-32, 2006, IEEE Computer Society, 0-7695-2671-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Frank M. Candocia, Daniel A. Mandarino |
A semiparametric model for accurate camera response function modeling and exposure estimation from comparametric data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 14(8), pp. 1138-1150, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Mirco Pieper, Anton Kummert |
Elimination of Exposure Artifacts in Predicted Images by Means of an Adaptive Circular Median Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (1) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 629-633, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 4591 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|