Topic
Image file formats
About: Image file formats is a research topic. Over the lifetime, 10349 publications have been published within this topic receiving 102407 citations.
Papers published on a yearly basis
Papers
More filters
•
31 Oct 2012TL;DR: In this article, an image layout apparatus consisting of a cropping unit, displaying unit, a checking unit, first and second computing units, a noticing unit, and a preventing unit is described.
Abstract: An image layout apparatus includes a cropping unit, a displaying unit, a checking unit, first and second computing units, a noticing unit, and a preventing unit. The cropping unit crops an image file image. The displaying unit displays and arranges cropped images on a page. The checking unit checks whether first and second image files are same. The first computing unit computes, in response to the first image file and the second image file being the same, an overlapping area between a first displayed image and a second displayed image. The second computing unit computes overlapping size ratio of the computed overlapping area. The noticing unit notices, in response to the first image file and the second image file being the same, information regarding duplication of image files. The preventing unit prevents, in response to the computed overlapping size ratio being smaller than a predetermined value, noticing the information.
77 citations
•
20 Aug 1998TL;DR: In this article, a conflict checking system is proposed to check for potential conflicts in one or more configuration image files, such as file conflicts, registry conflicts, and folder conflicts, where two registry values have the same name and belong to the same registry key, but have different data.
Abstract: A configuration image file is a single file containing all the information needed to troubleshoot, distribute or delete software from one or multiple computers. Information contained in configuration image files can comprise files, folders, shortcuts, and registry settings. The individual items in a configuration image file are entries. A conflict checking system includes conflict checking functions to check for potential conflicts in one or more configuration image files. A conflict exists when one or more configuration image files includes entries that are inconsistent. One version of the system identifies folder conflicts. A folder conflict exists when the same entry exists in more than one folder location in one or more configuration image files. Another version of the system identifies version conflicts. A version conflict exists when different versions of the same file exist in the same location within two configuration image files. Another version of the system identifies registry conflicts. A registry conflict exists when two registry values have the same name and belong to the same registry key, but have different data.
77 citations
•
28 Feb 2003
TL;DR: In this article, the authors present a method for remotely imaging a computer, which includes establishing a connection between two or more computers, extracting information from a storage device, and executing commands to create and format partitions on the storage device.
Abstract: Method for remotely imaging a computer. In one embodiment the method includes establishing a connection between two or more computers, extracting information from a storage device, and executing commands to create and format partitions on the storage device. The method may also include changing a bootsector of a partition, transferring data including utility data and an image file to a partition, and activating a boot indicator associated with the partition so as to re-image the storage device upon rebooting. Embodiments of the invention also include methods for removing a computer name from an associated network or domain, and augmenting security and identity parameters to allow the computer to be re-associated with a network or domain. Embodiments of the invention may be implemented using an imaging tool that, in one embodiment, includes an initialization module having one or more interfaces with input fields, a format module, and a naming module.
77 citations
••
TL;DR: Compression, by means of the JPEG algorithm, of up to 50 times the original size of 38 digital images of burns suffered by 22 consecutive patients did not lessen its great usefulness in determining the depth of burn injuries, according to a group of experts in burn care.
76 citations
•
16 Oct 2000
TL;DR: In this article, a file purging procedure is used to identify the oldest transaction table from among the transaction tables in the last image trail file accessed for each of the image trails, and for each image trail, the file purge procedure accesses the image trial files in a predefined chronological order.
Abstract: A primary computer system has a database, application programs that modify the local database, and a transaction manager that stores audit records in a local image trail reflecting those application program modifications to the local database. In a remote backup system, a Receiver process receives audit records from the primary system. The audit records include audit update and audit backout records indicating database updates and database backouts generated by transactions executing on the primary system. The Receiver stores the audit update and audit backout records in one or more image trails. For each image trail there is an Updater process that applies to a backup database volume the database updates and backouts indicated by the audit update and audit backout records in the image trail. The remote backup system periodically executes a file purge procedure, which identifies the oldest transaction table from among the transaction tables in the last image trail file accessed for each of the image trails. Then, for each image trail, the file purge procedure accesses the image trial files in a predefined chronological order and for each accessed image trail file it compares a first set of newest transaction identifiers in the file's transaction table with a second set of oldest transaction identifiers in the identified oldest transaction table. The procedure purges the accessed image trail file only when all of the transaction identifiers in the first set are older than corresponding transaction identifiers in the second set.
76 citations