- DocumentoVariable-Length Signature for Near-Duplicateenviado porshalini
- DocumentoSteganography Using Reversible Texture Synthesisenviado porshalini
- DocumentoRobust Representation and Recognition of Facialenviado porshalini
- DocumentoReversible Image Data Hiding Withenviado porshalini
- DocumentoRevealing the Trace of High-Quality JPEGenviado porshalini
- DocumentoPareto-Depth for Multiple-Query Image Retrievalenviado porshalini
- DocumentoMultifocus Image Fusion Based on NSCTenviado porshalini
- DocumentoImage Denoising by Exploring Externalenviado porshalini
- DocumentoFractal Analysis for Reduced Referenceenviado porshalini
- DocumentoFace Sketch Synthesis via Sparse Representation-Based Greedy Searchenviado porshalini
- DocumentoFace Recognition Across Non-Uniform Motionenviado porshalini
- DocumentoBoundary Detection Using Double-Opponencyenviado porshalini
- DocumentoA Probabilistic Approach for Color Correctionenviado porshalini
- DocumentoA No-Reference Texture Regularity Metricenviado porshalini
- DocumentoA Feature-Enriched Completely Blind Imageenviado porshalini
- DocumentoUniversal Network Coding-Basedenviado porshalini
- DocumentoSteganography Using Reversible Texture Synthesisenviado porshalini
- DocumentoSingle Image Superresolution Based Onenviado porshalini
- DocumentoSelCSP a Framework to Facilitateenviado porshalini
- DocumentoQuery Aware Determinization of Uncertainenviado porshalini
- DocumentoPSMPA Patient Self-Controllableenviado porshalini
- DocumentoPrivacy-Preserving and Truthful Detectionenviado porshalini
- DocumentoPrivacy Policy Inference of User-Uploadedenviado porshalini
- DocumentoPanda Public Auditing for Shared Dataenviado porshalini
- DocumentoPAGE a Partition Aware Engineenviado porshalini
- DocumentoOptimal Configuration of Networkenviado porshalini
- DocumentoMultiview Alignment Hashing Forenviado porshalini
- DocumentoMobile Data Gathering With Load Balancedenviado porshalini
- DocumentoLocation-Aware and Personalizedenviado porshalini
- DocumentoLearning Fingerprint Reconstructionenviado porshalini
- DocumentoKey-Recovery Attacks on KIDS, A Keyedenviado porshalini
- DocumentoImproved Privacy-Preserving P2P Multimediaenviado porshalini
- DocumentoIdentity-Based Distributed Provable Dataenviado porshalini
- DocumentoGenerating Searchable Public-Key Ciphertextsenviado porshalini
- DocumentoEye Gaze Tracking With a Web Cameraenviado porshalini
- DocumentoEnergy-Aware Load Balancing and Application Scaling for the Cloudenviado porshalini
- DocumentoEnabling Fine-grained Multi-keyword Searchenviado porshalini
- DocumentoDiscovery of Ranking Fraud for Mobile Appsenviado porshalini
- DocumentoDetection and Rectificationenviado porshalini
- DocumentoDefeating Jamming With the Power of Silenceenviado porshalini
- DocumentoCost-Minimizing Dynamic Migration of Content Distributionenviado porshalini
- DocumentoControl Cloud Data Access Privilege Andenviado porshalini
- DocumentoCollision Tolerant and Collision Free Packetenviado porshalini
- DocumentoCloud-Based Multimedia Content Protection Systemenviado porshalini
- DocumentoBehavior Rule Specification-Based Intrusionenviado porshalini
- DocumentoAutomatic Face Naming by Learning Discriminativeenviado porshalini
- DocumentoAuthenticated Key Exchange Protocols for Parallelenviado porshalini
- DocumentoAn Attribute-Assisted Reranking Modelenviado porshalini
- DocumentoA Secure and Dynamic Multi-keyword Rankedenviado porshalini