Sciweavers

ITCC
2000
IEEE
13 years 8 months ago
A Unified Derivation of Operational Matrices for Integration in Systems Analysis
Using the operational matrix of an orthogonal function to perform integration for solving, identifying and optimizing a linear dynamic system has several advantages: (1) the metho...
Jiunn-lin Wu, Chin-hsing Chen, Chih-fan Chen
ITCC
2000
IEEE
13 years 8 months ago
OctMesh - Interactive Mesh Browsing over the Internet
This paper proposes OctMesh, an interactive mesh browsing scheme over the Internet. In OctMesh, a large-scale mesh is encoded into one bit-stream, which is organized with respect ...
Hongwu Wang, Jin Li
ITCC
2000
IEEE
13 years 8 months ago
Towards Knowledge Discovery from WWW Log Data
As the result of interactions between visitors and a web site, an http log file contains very rich knowledge about users on-site behaviors, which, if fully exploited, can better c...
Feng Tao, Fionn Murtagh
ITCC
2000
IEEE
13 years 8 months ago
Dequantization Bias for JPEG Decompression
Standard JPEG decompression reconstructs quantized DCT coefficients to the center of the quantization bin. This fails to exploit the nonuniform distribution of the AC coefficien...
Jeffery R. Price, Majid Rabbani
ITCC
2000
IEEE
13 years 8 months ago
Projection-Based Multiuser Receiver over Frequency Selective Channels
In multiuser communication, the receiver’s performance is degraded by multiuser interference (MUI) as well as multipath distortions. This paper aims at elimination of these side...
Zhengyuan (Daniel) Xu
ITCC
2000
IEEE
13 years 8 months ago
Segmentation of Brazilian Bank Check Logos without a Priori Knowledge
This paper presents a method to locate and extract Brazilian bank check logos automatically by employing mathematical morphology. The objective is to minimize the number of heuris...
Andreia de Jesus, Jacques Facon
ITCC
2000
IEEE
13 years 8 months ago
Simple Collusion-Secure Fingerprinting Schemes for Images
This paper describes a robust watermarking algorithm and a collusion-secure fingerprinting scheme based on it. Watermarking robustness is obtained by using the JPEG algorithm to ...
Josep Domingo-Ferrer, Jordi Herrera-Joancomart&iac...