Sciweavers

CVPR
2010
IEEE
13 years 6 months ago
The Phase Only Transform for unsupervised surface defect detection
We present a simple, fast, and effective method to detect defects on textured surfaces. Our method is unsupervised and contains no learning stage or information on the texture bei...
Dror Aiger, Hugues Talbot
CIS
2008
Springer
13 years 6 months ago
Discrete Fourier Transform Computation Using Neural Networks
In this paper, a method is introduced how to process the Discrete Fourier Transform (DFT) by a singlelayer neural network with a linear transfer function. By implementing the sugg...
Rosemarie Velik
AMAST
2008
Springer
13 years 6 months ago
System Demonstration of Spiral: Generator for High-Performance Linear Transform Libraries
We demonstrate Spiral, a domain-specific library generation system. Spiral generates high performance source code for linear transforms (such as the discrete Fourier transform and ...
Yevgen Voronenko, Franz Franchetti, Fréd&ea...
FPGA
2006
ACM
139views FPGA» more  FPGA 2006»
13 years 8 months ago
Fast and accurate resource estimation of automatically generated custom DFT IP cores
This paper presents an equation-based resource utilization model for automatically generated discrete Fourier transform (DFT) soft core IPs. The parameterized DFT IP generator all...
Peter A. Milder, Mohammad Ahmad, James C. Hoe, Mar...
FP
1989
124views Formal Methods» more  FP 1989»
13 years 9 months ago
Deriving the Fast Fourier Algorithm by Calculation
This paper reports an explanation of an intricate algorithm in the terms of a potentially mechanisable rigorous-development method. It uses notations and techniques of Sheeran 1] ...
Geraint Jones
ASIACRYPT
1998
Springer
13 years 9 months ago
Optimal Resistance Against the Davies and Murphy Attack
Abstract. In recent years, three main types of attacks have been developed against Feistel-based ciphers, such as DES[1]; these attacks are linear cryptanalysis[2], differential cr...
Thomas Pornin
ISCAS
2003
IEEE
185views Hardware» more  ISCAS 2003»
13 years 10 months ago
A semi-fragile object based video authentication system
This paper presents a semi-fragile object-based authentication solution for MPEG4 video. To protect the integrity of the video objects / sequences, a content-based watermark is em...
Dajun He, Qibin Sun, Qi Tian
3DIM
2005
IEEE
13 years 10 months ago
Transform-Based Methods for Indexing and Retrieval of 3D Objects
We compare two transform-based indexing methods for retrieval of 3D objects. We apply 3D Discrete Fourier Transform (DFT) and 3D Radial Cosine Transform (RCT) to the voxelized dat...
Helin Dutagaci, Bülent Sankur, Yücel Yem...
SSC
2007
Springer
126views Cryptology» more  SSC 2007»
13 years 11 months ago
Randomness and Representation of Span n Sequences
Any span n sequences can be regarded as filtering sequences. From this observation, new randomness criteria for span n sequences are proposed. It is proved that the feedback funct...
Guang Gong
GECCO
2007
Springer
137views Optimization» more  GECCO 2007»
13 years 11 months ago
Extended probe method for linkage discovery over high-cardinality alphabets
The work addresses the problem of identifying the epistatic linkage of a function from high cardinality alphabets to the real numbers. It is a generalization of Heckendorn and Wri...
Shude Zhou, Zengqi Sun, Robert B. Heckendorn