Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
116 | Steven D. Galbraith, Wenbo Mao |
Invisibility and Anonymity of Undeniable and Confirmer Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 80-97, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
confirmer signatures, anonymity, RSA, Undeniable signatures, invisibility |
63 | Frank Nielsen |
The Digital Chameleon Principle: Computing Invisibility by Rendering Transparency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Computer Graphics and Applications ![In: IEEE Computer Graphics and Applications 27(1), pp. 90-96, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Optical Camouflage, Integral Photography, Light Field, Invisibility |
53 | Kaoru Kurosawa, Swee-Huay Heng |
Relations Among Security Notions for Undeniable Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 34-48, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security notions, factoring assumption, composite decision Diffie-Hellman assumption, Undeniable signature |
50 | Michael Eisenberg, Ann Eisenberg, Leah Buechley, Nwanua Elumeze |
Invisibility Considered Harmful: Revisiting Traditional Principles of Ubiquitous Computing in the Context of Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMTE ![In: 4th IEEE International Workshop on Wireless and Mobile Technologies in Education, WMTE 2006, Athens, Greece, November 16-17, 2006, pp. 103-110, 2006, IEEE Computer Society, 0-7695-2723-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Saeed Rashwand, Jelena V. Misic |
A novel access control framework for secure pervasive computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 829-833, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, access control, context, dynamicity, heterogeneity, invisibility |
40 | Jill Jameson |
Distributed Leadership, Trust and Online Communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (12) ![In: Online Communities and Social Computing, Third International Conference, OCSC 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 226-235, 2009, Springer, 978-3-642-02773-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Distributed leadership, e-learning, case study, pattern-matching, online communities, visibility, ambiguity, paradox, invisibility |
40 | Bin Liu 0008, Fenlin Liu, Chunfang Yang, Yifeng Sun |
Secure Steganography in Compressed Video Bitstreams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1382-1387, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Video Steganography, Statistical Invisibility, Data Hiding |
40 | Victor K. Wei |
Invisible designated confirmer signatures without random oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 356-358, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Xinshan Zhu |
Image-Adaptive Watermarking Using the Improved Signal to Noise Ratio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 616-625, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Elizabeth A. Kemp, Ashleigh-Jane Thompson, Russell S. Johnson |
Interface evaluation for invisibility and ubiquity: an example from e-learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHINZ ![In: Proceedings of the 9th ACM SIGCHI New Zealand Chapter's International Conference on Computer-Human Interaction: Design Centered HCI, 2008, Wellington, New Zealand, July 2, 2008, pp. 31-38, 2008, ACM, 978-1-60558-467-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
learning appliance, ubiquitous computing, interface evaluation |
36 | Matthew Kaplan 0001 |
Hybrid quantitative invisibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPAR ![In: 5th International Symposium on Non-Photorealistic Animation and Rendering, NPAR 2007, San Diego, CA, USA, August 4-5, 2007, Proceedings, pp. 51-52, 2007, ACM, 978-1-59593-624-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Karen Su, Deepa Kundur, Dimitrios Hatzinakos |
Statistical invisibility for collusion-resistant digital video watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 7(1), pp. 43-51, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Karen Su, Deepa Kundur, Dimitrios Hatzinakos |
Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 7(1), pp. 52-66, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Olav W. Bertelsen, Marianne Graves Petersen |
Erotic life as a new frontier in HCI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI (2) ![In: Proceedings of the 21st British HCI Group Annual Conference on HCI 2007: HCI...but not as we know it - Volume 2, BCS HCI 2007, University of Lancaster, United Kingdom, 3-7 September 2007, pp. 7-10, 2007, BCS, 978-1-902505-95-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
erotic life, life quality, visibility and invisibility, workplace rationality, communication, aesthetics, interactive spaces |
27 | Betty Beaumont |
Decompression: a living laboratory in cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia Workshops ![In: Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30 - November 3, 2000, pp. 9-12, 2000, ACM Press, 1-58113-311-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
ecological art, electronic media, virtual reality, perceptual models, invisibility |
27 | Suk Hwan Lee, Ki-Ryong Kwon |
Mesh watermarking based projection onto two convex sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 13(5-6), pp. 323-330, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
VRML, Digital watermarking, 3D mesh, POCS |
27 | Tsz Kin Tsui, Xiao-Ping (Steven) Zhang, Dimitrios Androutsos |
Color Image Watermarking Using Multidimensional Fourier Transforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 3(1), pp. 16-28, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Kaoru Kurosawa, Jun Furukawa 0001 |
Universally Composable Undeniable Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, pp. 524-535, 2008, Springer, 978-3-540-70582-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
undeniable signature scheme, Universal composability |
27 | Taekyoung Kwon 0002, Sang-ho Park, Sooyeon Shin |
Multi-modal Authentication for Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (6) ![In: Universal Access in Human-Computer Interaction. Ambient Interaction, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 Held as Part of HCI International 2007 Beijing, China, July 22-27, 2007 Proceedings, Part II, pp. 113-121, 2007, Springer, 978-3-540-73280-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Nadia Baaziz |
Adaptive watermarking schemes based on a redundant contourlet transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (1) ![In: Proceedings of the 2005 International Conference on Image Processing, ICIP 2005, Genoa, Italy, September 11-14, 2005, pp. 221-224, 2005, IEEE, 0-7803-9134-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Jean Monnerat, Serge Vaudenay |
Chaum's Designated Confirmer Signature Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 164-178, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Hongmei Liu 0001, Fenglian Shao, Jiwu Huang |
A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 123-134, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Craig Chatfield, David J. Carmichael, René Hexel, Judy Kay, Bob Kummerfeld |
Personalisation in intelligent environments: managing the information flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OZCHI ![In: Proceedings of the 2005 Australasian Computer-Human Interaction Conference, OZCHI 2005, Canberra, Australia, November 21-25, 2005, 2005, ACM, 1-59593-222-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, trust, intelligent environment |
27 | Benoît Libert, Jean-Jacques Quisquater |
Identity Based Undeniable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 112-125, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
provable security, pairings, undeniable signatures, ID-based cryptography |
27 | Karen Su, Deepa Kundur, Dimitrios Hatzinakos |
A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (1) ![In: Proceedings of the 2001 International Conference on Image Processing, ICIP 2001, Thessaloniki, Greece, October 7-10, 2001, pp. 818-821, 2001, IEEE, 0-7803-6725-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Alexander A. Grusho |
Mathematical Models of the Covert Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings, pp. 15-20, 2001, Springer, 3-540-42103-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Dale M. Johnson, F. Javier Thayer |
Stating Security Requirements with Tolerable Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 6(3), pp. 284-295, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
23 | Surbhi Shaw, Ratna Dutta |
A quantum resistant multi-user signcryption scheme featuring key invisibility for Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 76, pp. 103549, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Yaoyuan Zhang, Yu-an Tan 0001, Haipeng Sun, Yuhang Zhao 0003, Quanxin Zhang, Yuanzhang Li |
Improving the invisibility of adversarial examples with perceptually adaptive perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 635, pp. 126-137, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Heather Ford, Tamson Pietsch, Kelly Tall |
Gender and the invisibility of care on Wikipedia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Big Data Soc. ![In: Big Data Soc. 10(2), July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Raz Lapid, Moshe Sipper |
Patch of Invisibility: Naturalistic Black-Box Adversarial Attacks on Object Detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.04238, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Deepika Yadav, Madeline Balaam, Airi Lampinen |
Invisibility or Visibility in Intimate Care at the Workplace? Examining the Use of Breast Pumps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023, pp. 213:1-213:15, 2023, ACM, 978-1-4503-9421-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Himanshi Chaudhary, Virendra P. Vishwakarma |
Secure Watermarking Algorithm for Enhancing Invisibility and Robustness of Medical Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023, Delhi, India, July 6-8, 2023, pp. 1-7, 2023, IEEE, 979-8-3503-3509-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Reema Thabit, Nur Izura Udzir, Sharifah Md Yasin, Aziah Asmawi, Adnan Abdul-Aziz Gutub |
CSNTSteg: Color Spacing Normalization Text Steganography Model to Improve Capacity and Invisibility of Hidden Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 65439-65458, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Rainara Maia Carvalho, Rossana Maria de Castro Andrade, Káthia Marçal de Oliveira |
Catalog of invisibility correlations for UbiComp and IoT applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 27(3), pp. 317-350, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Tracey Balehowsky, Matti Lassas, Pekka Pankka, Ville Sirviö |
Invisibility Cloaking and Transformation Optics for Three Dimensional Manifolds and Applications in Cosmology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Math. Anal. ![In: SIAM J. Math. Anal. 54(3), pp. 3420-3456, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Vicky Kluzik |
Governing invisibility in the platform economy: excavating the logics of platform care. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Policy Rev. ![In: Internet Policy Rev. 11(1), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Wen Chean Teh, Johnny Lim |
Evolvability of reaction systems and the invisibility theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 924, pp. 17-33, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Long Dai, Jiarong Mao, Xuefeng Fan, Xiaoyi Zhou |
DeepHider: A Multi-module and Invisibility Watermarking Scheme for Language Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.04676, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Sarah Diefenbach, Lara Christoforakos, Daniel Ullrich, Andreas Butz |
Invisible but Understandable: In Search of the Sweet Spot between Technology Invisibility and Transparency in Smart Spaces and Beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multimodal Technol. Interact. ![In: Multimodal Technol. Interact. 6(10), pp. 95, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Maria Edström |
Missing Voices and Gendered Ageism -Patterns of Invisibility in Global News Media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (29) ![In: Human Aspects of IT for the Aged Population. Design, Interaction and Technology Acceptance - 8th International Conference, ITAP 2022, Held as Part of the 24th HCI International Conference, HCII 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part I, pp. 311-320, 2022, Springer, 978-3-031-05580-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Juan Bossio, Illari Diez |
Digital Communication to Tackle Invisibility: A Project to Enhance Communication Capacities of Transmale Organizations in Peru and Central America. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICT4D ![In: Freedom and Social Inclusion in a Connected World - 17th IFIP WG 9.4 International Conference on Implications of Information and Digital Technologies for Development, ICT4D 2022, Lima, Peru, May 25-27, 2022, Proceedings, pp. 555-565, 2022, Springer, 978-3-031-19428-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | José Cezar de Souza Filho, Andréia Libório Sampaio, Eduardo Luzeiro Feitosa |
Hidden things and implicit interaction: looking back on how invisibility evolved as a quality-in-use attribute. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IHC ![In: Proceedings of the 21st Brazilian Symposium on Human Factors in Computing Systems, IHC 2022, Diamantina, Brazil, October 17-21, 2022, pp. 19:1-19:11, 2022, ACM, 978-1-4503-9506-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Masahito Ishizaka, Kazuhide Fukushima, Shinsaku Kiyomoto |
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2022 - 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers, pp. 337-362, 2022, Springer, 978-3-031-29370-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Jae Hoon Lim, Brittany Hunt, Nickcoy A. Findlater, Peter T. Tkacik, Jerry L. Dahlberg |
"In Our Own Little World": Invisibility of the Social and Ethical Dimension of Engineering Among Undergraduate Students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Eng. Ethics ![In: Sci. Eng. Ethics 27(6), pp. 74, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Noopur Raval |
Interrupting invisibility in a global world. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Interactions ![In: Interactions 28(4), pp. 27-31, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Youzi He, Hongyu Liu 0001, Xianchao Wang |
Invisibility enables super-visibility in electromagnetic imaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2112.07896, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Mathew Schwartz, Yong Geng, Hakam Agha, Rijeesh Kizhakidathazhath, Danqing Liu, Gabriele Lenzini, Jan P. F. Lagerwall |
Linking Physical Objects to Their Digital Twins via Fiducial Markers Designed for Invisibility to Humans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2105.05800, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
23 | Bo Wang, Zhiguo Yang, Li-Lian Wang, Shidong Jiang |
On Time-Domain NRBC for Maxwell's Equations and Its Application in Accurate Simulation of Electromagnetic Invisibility Cloaks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 86(2), pp. 20, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Cheng Chen, Jiayin Cai, Yao Hu, Xu Tang, Xinggang Wang, Chun Yuan, Xiang Bai, Song Bai |
Deep Interactive Video Inpainting: An Invisibility Cloak for Harry Potter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: MM '21: ACM Multimedia Conference, Virtual Event, China, October 20 - 24, 2021, pp. 862-870, 2021, ACM, 978-1-4503-8651-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Yongxin Wang, Duminda Wijesekera |
Pixel Invisibility: Detect Object Unseen in Color Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEHITS ![In: Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS 2021, Online Streaming, April 28-30, 2021., pp. 201-210, 2021, SCITEPRESS, 978-989-758-513-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Jorge da Cruz Pinto, Bárbara Formiga |
Perception and Invisibility: Urban-Architectural Reception of Lisbon Downtown. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AHFE (14) ![In: Advances in Human Factors in Architecture, Sustainable Urban Planning and Infrastructure - Proceedings of the AHFE 2021 Virtual Conference on Human Factors in Architecture, Sustainable Urban Planning and Infrastructure, July 25-29, 2021, USA, pp. 206-214, 2021, Springer, 978-3-030-80709-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Jonathan Bean, Kristina Currans, Nicole Iroz-Elardo |
Unmasking invisibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Interactions ![In: Interactions 27(3), pp. 22-23, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa |
On the Invisibility and Anonymity of Undeniable Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. ![In: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(1), pp. 18-34, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Yongxin Wang, Duminda Wijesekera |
Pixel Invisibility: Detecting Objects Invisible in Color Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.08383, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
23 | Bo Wang, Zhiguo Yang, Li-lian Wang, Shidong Jiang |
On time-domain NRBC for Maxwell's equations and its application in accurate simulation of electromagnetic invisibility cloaks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.14197, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
23 | Saleh Al-Ardhi, Vijey Thayananthan, Abdullah Basuhail |
Invisibility and Fidelity Vector Map Watermarking Based on Linear Cellular Automata Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAI (3) ![In: Intelligent Computing - Proceedings of the 2020 Computing Conference, Volume 3, pp. 185-197, 2020, Springer, 978-3-030-52242-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Rainara Maia Carvalho, Rossana M. C. Andrade, Káthia M. de Oliveira |
How developers believe Invisibility impacts NFRs related to User Interaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 28th IEEE International Requirements Engineering Conference, RE 2020, Zurich, Switzerland, August 31 - September 4, 2020, pp. 102-112, 2020, IEEE, 978-1-7281-7438-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Zuxuan Wu, Ser-Nam Lim, Larry S. Davis, Tom Goldstein |
Making an Invisibility Cloak: Real World Adversarial Attacks on Object Detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCV (4) ![In: Computer Vision - ECCV 2020 - 16th European Conference, Glasgow, UK, August 23-28, 2020, Proceedings, Part IV, pp. 1-17, 2020, Springer, 978-3-030-58547-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Anna Marie Rezk, Mads Haahr |
The Case for Invisibility: Understanding and Improving Agency in Black Mirror's Bandersnatch and Other Interactive Digital Narrative Works. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIDS ![In: Interactive Storytelling - 13th International Conference on Interactive Digital Storytelling, ICIDS 2020, Bournemouth, UK, November 3-6, 2020, Proceedings, pp. 178-189, 2020, Springer, 978-3-030-62515-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Lan Zhang 0002, Xiang-Yang Li 0001, Kebin Liu, Cihang Liu, Xuan Ding, Yunhao Liu 0001 |
Cloak of Invisibility: Privacy-Friendly Photo Capturing and Sharing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 18(11), pp. 2488-2501, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Roberta Palmeri, Tommaso Isernia |
Volumetric Invisibility Cloaks Design Through Spectral Coverage Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 30860-30867, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Zuxuan Wu, Ser-Nam Lim, Larry Davis 0001, Tom Goldstein |
Making an Invisibility Cloak: Real World Adversarial Attacks on Object Detectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1910.14667, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
23 | Andy Lemon, Hillegonda C. Rietveld |
The Street Fighter Lady: Invisibility and Gender in Game Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Digit. Games Res. Assoc. ![In: Trans. Digit. Games Res. Assoc. 5(1), 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Kotaro Nagahama, Kimitoshi Yamazaki |
Learning from Demonstration Based on a Mechanism to Utilize an Object's Invisibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2019, Macau, SAR, China, November 3-8, 2019, pp. 6120-6127, 2019, IEEE, 978-1-7281-4004-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa |
A Note on the Invisibility and Anonymity of Undeniable Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers, pp. 112-125, 2019, Springer, 978-3-030-39302-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Yi Liu, Zhen Liu 0008, Yu Long 0001, Zhiqiang Liu 0001, Dawu Gu, Fei Huan, Yanxue Jia |
TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings, pp. 339-346, 2019, Springer, 978-3-030-31918-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Michel Anteby, Curtis K. Chan |
A Self-Fulfilling Cycle of Coercive Surveillance: Workers' Invisibility Practices and Managerial Justification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Organ. Sci. ![In: Organ. Sci. 29(2), pp. 247-263, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Lucas Chesnel, Sergei A. Nazarov, Vincent Pagneux |
Invisibility and Perfect Reflectivity in Waveguides with Finite Length Branches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Appl. Math. ![In: SIAM J. Appl. Math. 78(4), pp. 2176-2199, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Ceren Babayigit, Emre Bor, Hamza Kurt, Kestutis Staliunas, Mirbek Turduev |
Directional Invisibility of Elliptical Shaped All Dielectric Structure Induced by Evolutionary Optimization Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTON ![In: 2018 20th International Conference on Transparent Optical Networks (ICTON), Bucharest, Romania, July 1-5, 2018, pp. 1-4, 2018, IEEE, 978-1-5386-6605-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Rainara M. Carvalho, Rossana M. C. Andrade, Káthia Marçal de Oliveira, Christophe Kolski |
Catalog of Invisibility Requirements for UbiComp and IoT Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 26th IEEE International Requirements Engineering Conference, RE 2018, Banff, AB, Canada, August 20-24, 2018, pp. 88-99, 2018, IEEE Computer Society, 978-1-5386-7418-5. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Rainara Maia Carvalho, Rossana M. C. Andrade, Káthia Marçal de Oliveira |
Correlations between invisibility and usability in ubicomp and IoT applications: partial results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBES ![In: Proceedings of the XXXII Brazilian Symposium on Software Engineering, SBES 2018, Sao Carlos, Brazil, September 17-21, 2018, pp. 214-219, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Hiroshi Unno 0002, Kazutake Uehira |
Invisibility and readability of temporally and spatially intensity-modulated meta-image for information hiding on digital signage display system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: IEEE Industry Applications Society Annual Meeting, IAS 2018, Portland, OR, USA, September 23-27, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-4537-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Sayan Bhattacharyya |
Non-normative Data From The Global South And Epistemically Produced Invisibility In Computationally Mediated Inquiry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DH ![In: 13th Annual International Conference of the Alliance of Digital Humanities Organizations, DH 2018, Mexico City, Mexico, June 26-29, 2018, Conference Abstracts, pp. 162-163, 2018, Red de Humanidades Digitales A. C., 978-0-911221-62-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
23 | Rosalie Goldsmith |
Investigating the invisibility of writing practices in the engineering curriculum ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2018 |
RDF |
|
23 | Maryam Bayati, Masood Omoomi |
Analysis and design of an invisibility cloak based on transformationoptics at microwave frequencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Turkish J. Electr. Eng. Comput. Sci. ![In: Turkish J. Electr. Eng. Comput. Sci. 25, pp. 4486-4495, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Qingwei Shao, Minxian Li, Chunxia Zhao |
Long-term Tracking with Adaptive Correlation Filters for Object Invisibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSPS ![In: Proceedings of the 9th International Conference on Signal Processing Systems, ICSPS 2017, Auckland, New Zealand, November 27-30, 2017, pp. 188-193, 2017, ACM. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Priyank Chandra |
Informality and Invisibility: Traditional Technologies as Tools for Collaboration in an Informal Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, Denver, CO, USA, May 06-11, 2017., pp. 4765-4775, 2017, ACM, 978-1-4503-4655-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Yuxiang Sun, Ming Liu 0001, Max Q.-H. Meng |
Invisibility: A moving-object removal approach for dynamic scene modelling using RGB-D camera. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ROBIO ![In: 2017 IEEE International Conference on Robotics and Biomimetics, ROBIO 2017, Macau, China, December 5-8, 2017, pp. 50-55, 2017, IEEE, 978-1-5386-3742-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Rosalie Goldsmith, Keith Willey |
Using practice architectures to investigate the invisibility of writing practices in the engineering curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIE ![In: 2017 IEEE Frontiers in Education Conference, FIE 2017, Indianapolis, IN, USA, October 18-21, 2017, pp. 1-6, 2017, IEEE Computer Society, 978-1-5090-5920-1. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Hiroshi Unno 0002, Youichi Takashima, Kazutake Uehira |
Improving compatibility with invisibility and readability for new 3D image display system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: 2017 IEEE Industry Applications Society Annual Meeting, Cincinnati, OH, USA, October 1-5, 2017, pp. 1-8, 2017, IEEE, 978-1-5090-4894-6. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Matti Lassas, Ting Zhou |
The Blow-up of Electromagnetic Fields in 3-Dimensional Invisibility Cloaking for Maxwell's Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Appl. Math. ![In: SIAM J. Appl. Math. 76(2), pp. 457-478, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Linus Feiten, Sebastian Sester, Christian Zimmermann 0002, Sebastian Volkmann, Laura Wehle, Bernd Becker 0001 |
Revocable Anonymisation in Video Surveillance: A "Digital Cloak of Invisibility". ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCC ![In: Technology and Intimacy: Choice or Coercion - 12th IFIP TC 9 International Conference on Human Choice and Computers, HCC12 2016, Salford, UK, September 7-9, 2016, Proceedings, pp. 314-327, 2016, Springer, 978-3-319-44804-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Jialong Zhang, Xin Hu 0001, Jiyong Jang, Ting Wang 0006, Guofei Gu, Marc Ph. Stoecklin |
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: 35th Annual IEEE International Conference on Computer Communications, INFOCOM 2016, San Francisco, CA, USA, April 10-14, 2016, pp. 1-9, 2016, IEEE, 978-1-4673-9953-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Sue Greener |
Does learning technology need an invisibility cloak? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Interact. Learn. Environ. ![In: Interact. Learn. Environ. 23(3), pp. 267-268, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Jonathan Mercier-Ganady, Maud Marchal, Anatole Lécuyer |
B-C-invisibility power: introducing optical camouflage based on mental activity in augmented reality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AH ![In: Proceedings of the 6th Augmented Human International Conference, AH 2015, Singapore, March 9-11, 2015, pp. 97-100, 2015, ACM, 978-1-4503-3349-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Claus Bossen, Lotte Groth Jensen, Flemming Witt Udsen |
Boundary-Object Trimming: On the Invisibility of Medical Secretaries' Care of Records in Healthcare Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Support. Cooperative Work. ![In: Comput. Support. Cooperative Work. 23(1), pp. 75-110, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Luis L. Sánchez-Soto, Juan J. Monzón |
Invisibility and PT Symmetry: A Simple Geometrical Viewpoint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 6(2), pp. 396-408, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Vasireddy Srikanth, Pillem Ramesh |
Invisibility System Using Image Processing and Optical Camouflage Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1404.4107, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
23 | Faezeh Sadat Babamir, Ali Norouzi |
Achieving Key Privacy and Invisibility for Unattended Wireless Sensor Networks in Healthcare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 57(4), pp. 624-635, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Irene J. Petrick |
The Tinker Toy Challenge - Peeking Under the Cloak of Invisibility in Information System Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Innovative Practices in Teaching Information Sciences and Technology ![In: Innovative Practices in Teaching Information Sciences and Technology, Experience Reports and Reflections, pp. 63-73, 2014, Springer, 978-3-319-03655-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Hiroshi Unno 0002, Youichi Takashima, Kazutake Uehira |
Design considerations for new 3D image display system with improved compatibility with invisibility and readability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: 2014 IEEE Industry Application Society Annual Meeting, Vancouver, BC, Canada, October 5-9, 2014, pp. 1-8, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Akira Uchida, Masaaki Fujiyoshi, Sayaka Shiota, Hitoshi Kiya |
Image invisibility assessment for visually encrypted images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPACS ![In: International Symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2014, Kuching, Sarawak, Malaysia, December 1-4, 2014, pp. 71-75, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Su Xu, Yong Wang, Baile Zhang, Hongsheng Chen |
Invisibility cloaks from forward design to inverse design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 56(12), pp. 1-11, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Krzysztof Burdzy, Tadeusz Kulczycki |
Invisibility via reflecting coating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Lond. Math. Soc. ![In: J. Lond. Math. Soc. 88(2), pp. 359-374, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Lilly Irani, M. Six Silberman |
Turkopticon: interrupting worker invisibility in amazon mechanical turk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, CHI '13, Paris, France, April 27 - May 2, 2013, pp. 611-620, 2013, ACM, 978-1-4503-1899-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Avishag Gordon |
The invisibility of science publications in hebrew: A comparative database study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Assoc. Inf. Sci. Technol. ![In: J. Assoc. Inf. Sci. Technol. 63(3), pp. 607-615, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Taina Bucher |
Want to be on the top? Algorithmic power and the threat of invisibility on Facebook. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Media Soc. ![In: New Media Soc. 14(7), pp. 1164-1180, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Noam Lapidot-Lefler, Azy Barak |
Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Hum. Behav. ![In: Comput. Hum. Behav. 28(2), pp. 434-443, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Kohei Arai |
Data Hiding Method Based on Dyadic Wavelet Transformation Improving Invisibility of Secret Images on Circulation Images by Means of Run-Length Coding with Permutation Matrix Based on Random Number. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Ninth International Conference on Information Technology: New Generations, ITNG 2012, Las Vegas, Nevada, USA, 16-18 April, 2012, pp. 618-622, 2012, IEEE Computer Society, 978-0-7695-4654-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|