Sciweavers

AES
2005
Springer
81views Cryptology» more  AES 2005»
13 years 4 months ago
Detection and removal of video defects using rational-based techniques
Lazhar Khriji, Mahmoud Meribout, Moncef Gabbouj
AES
2005
Springer
82views Cryptology» more  AES 2005»
13 years 4 months ago
Design optimization
Santiago Hernández
AES
2005
Springer
137views Cryptology» more  AES 2005»
13 years 4 months ago
Design of a multimedia processor based on metrics computation
Media-processing applications, such as signal processing, 2D and 3D graphics rendering, and image compression, are the dominant workloads in many embedded systems today. The real-...
Nader Ben Amor, Yannick Le Moullec, Jean-Philippe ...
AES
2005
Springer
105views Cryptology» more  AES 2005»
13 years 4 months ago
TH-collocation for the biharmonic equation
This paper is intended as a contribution to enhance orthogonal collocation methods. In this, a novel collocation method--TH-collocation--is applied to the biharmonic equation and ...
Martín Díaz, Ismael Herrera
AES
2005
Springer
81views Cryptology» more  AES 2005»
13 years 4 months ago
Optimum design of an interbody implant for lumbar spine fixation
A new minimally invasive surgical technique for lumbar spine fixation is currently in development. The procedure makes use of an interbody implant that is inserted between two ver...
Andrés Tovar, Shawn E. Gano, James J. Mason...