Optimal Correspondence of String Subsequences
IEEE Transactions on Pattern Analysis and Machine Intelligence
Microprocessors: Fundamentals and Applications
Microprocessors: Fundamentals and Applications
Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography
IEEE Transactions on Pattern Analysis and Machine Intelligence
Print signatures for document authentication
Proceedings of the 10th ACM conference on Computer and communications security
Two-dimensional bar code as a medium for electronic data interchange
International Journal of Electronic Commerce - Special section: Information technology and the virtual organization
Integrated Computer-Aided Engineering
Secure coprocessors in electronic commerce applications
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
A Usability Evaluation of Public Icon Interface
Proceedings of the 13th International Conference on Human-Computer Interaction. Part I: New Trends
Usability evaluation of designed image code interface for mobile computing environment
HCI'07 Proceedings of the 12th international conference on Human-computer interaction: interaction platforms and techniques
WSEAS Transactions on Information Science and Applications
Imaged based codes performance comparison for mobile environments
HCII'11 Proceedings of the 14th international conference on Human-computer interaction: design and development approaches - Volume Part I
Constructing collaborative services through augmented documents and objects
Proceedings of the 6th International Symposium on Visual Information Communication and Interaction
Hi-index | 4.10 |
Various schemes proposed for storing more information in the bar code label are reviewed. The concept of information density is introduced. The constraints imposed by the reading technology are addressed, and various recently proposed stacked bar codes are surveyed. Certain non-bar-code solutions are discussed.