Transparency (projection)

Known as: Transparencies, Transparency, Viewgraph 
A transparency, also known variously as a viewfoil, foil, or viewgraph, is a thin sheet of transparent flexible material, typically cellulose acetate… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1951-2018
0204019512017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
Visual cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares… (More)
  • figure 2
  • figure 1
  • figure 6
  • figure 5
  • figure 7
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In order to evaluate short-term and long-term effects of fish manipulation in shallow, eutrophic lakes, empirical studies on… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this paper we present a hierarchy-based visualization approach for software metrics using Treemaps. Contrary to existing… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Visual cryptography encodes a secret binary image (SI) into n shares of random binary patterns. If the shares are xeroxed onto… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
An extended visual cryptography scheme, EVCS for short, for an access structure (? Qual ; ? Forb) on a set of n participants, is… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
The aim of the study was to investigate the relationship between learners’ cognitive styles and their instructional preferences… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
1996
Highly Cited
1996
A visual cryptography scheme for a set P of n participants is a method to encode a secret image SI into n shadow images called… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
A visual cryptography scheme is a method to encode a secret image SI into shadow images called shares such that certain qualified… (More)
Is this relevant?
Highly Cited
1994
Highly Cited
1994
In this paper we consider a new type of cryptographic scheme, which can decode concealed images without any cryptographic… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1990
Highly Cited
1990
Techniques are presented that are used to animate and render particle systems with the Connection Machine CM-2, a data parallel… (More)
Is this relevant?