- DocumentVariable-Length Signature for Near-Duplicateuploaded by
shalini
- DocumentSteganography Using Reversible Texture Synthesisuploaded by
shalini
- DocumentRobust Representation and Recognition of Facialuploaded by
shalini
- DocumentReversible Image Data Hiding Withuploaded by
shalini
- DocumentRevealing the Trace of High-Quality JPEGuploaded by
shalini
- DocumentPareto-Depth for Multiple-Query Image Retrievaluploaded by
shalini
- DocumentMultifocus Image Fusion Based on NSCTuploaded by
shalini
- DocumentImage Denoising by Exploring Externaluploaded by
shalini
- DocumentFractal Analysis for Reduced Referenceuploaded by
shalini
- DocumentFace Sketch Synthesis via Sparse Representation-Based Greedy Searchuploaded by
shalini
- DocumentFace Recognition Across Non-Uniform Motionuploaded by
shalini
- DocumentBoundary Detection Using Double-Opponencyuploaded by
shalini
- DocumentA Probabilistic Approach for Color Correctionuploaded by
shalini
- DocumentA No-Reference Texture Regularity Metricuploaded by
shalini
- DocumentA Feature-Enriched Completely Blind Imageuploaded by
shalini
- DocumentUniversal Network Coding-Baseduploaded by
shalini
- DocumentSteganography Using Reversible Texture Synthesisuploaded by
shalini
- DocumentSingle Image Superresolution Based Onuploaded by
shalini
- DocumentSelCSP a Framework to Facilitateuploaded by
shalini
- DocumentQuery Aware Determinization of Uncertainuploaded by
shalini
- DocumentPSMPA Patient Self-Controllableuploaded by
shalini
- DocumentPrivacy-Preserving and Truthful Detectionuploaded by
shalini
- DocumentPrivacy Policy Inference of User-Uploadeduploaded by
shalini
- DocumentPanda Public Auditing for Shared Datauploaded by
shalini
- DocumentPAGE a Partition Aware Engineuploaded by
shalini
- DocumentOptimal Configuration of Networkuploaded by
shalini
- DocumentMultiview Alignment Hashing Foruploaded by
shalini
- DocumentMobile Data Gathering With Load Balanceduploaded by
shalini
- DocumentLocation-Aware and Personalizeduploaded by
shalini
- DocumentLearning Fingerprint Reconstructionuploaded by
shalini
- DocumentKey-Recovery Attacks on KIDS, A Keyeduploaded by
shalini
- DocumentImproved Privacy-Preserving P2P Multimediauploaded by
shalini
- DocumentIdentity-Based Distributed Provable Datauploaded by
shalini
- DocumentGenerating Searchable Public-Key Ciphertextsuploaded by
shalini
- DocumentEye Gaze Tracking With a Web Camerauploaded by
shalini
- DocumentEnergy-Aware Load Balancing and Application Scaling for the Clouduploaded by
shalini
- DocumentEnabling Fine-grained Multi-keyword Searchuploaded by
shalini
- DocumentDiscovery of Ranking Fraud for Mobile Appsuploaded by
shalini
- DocumentDetection and Rectificationuploaded by
shalini
- DocumentDefeating Jamming With the Power of Silenceuploaded by
shalini
- DocumentCost-Minimizing Dynamic Migration of Content Distributionuploaded by
shalini
- DocumentControl Cloud Data Access Privilege Anduploaded by
shalini
- DocumentCollision Tolerant and Collision Free Packetuploaded by
shalini
- DocumentCloud-Based Multimedia Content Protection Systemuploaded by
shalini
- DocumentBehavior Rule Specification-Based Intrusionuploaded by
shalini
- DocumentAutomatic Face Naming by Learning Discriminativeuploaded by
shalini
- DocumentAuthenticated Key Exchange Protocols for Paralleluploaded by
shalini
- DocumentAn Attribute-Assisted Reranking Modeluploaded by
shalini
- DocumentA Secure and Dynamic Multi-keyword Rankeduploaded by
shalini