Sciweavers

1567 search results - page 156 / 314
» A Mechanized Model of the Theory of Objects
Sort
View
ICIP
2008
IEEE
16 years 3 months ago
A perceptual metric for blind measurement of blocking artifacts with applications in transform-block-based image and video codin
In this paper, we analyze the formation of blocking artifacts as a result of quantization of the discrete cosine transform (DCT) coefficients. These artifacts are known to be the ...
Koohyar Minoo, Truong Q. Nguyen
WWW
2008
ACM
16 years 2 months ago
Guanxi in the chinese web - a study of mutual linking
Guanxi is a type of dyadic social interaction based on feelings ("qing") and trust ("xin"). Long studied by scholars of Chinese origin, it has recently drawn t...
Valerie King, Louis Lei Yu, Yan Zhuang
107
Voted
PERCOM
2009
ACM
16 years 2 months ago
RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with p...
Feng Zhu, Wei Zhu
MMSEC
2005
ACM
147views Multimedia» more  MMSEC 2005»
15 years 7 months ago
A Bayesian image steganalysis approach to estimate the embedded secret message
Image steganalysis so far has dealt only with detection of a hidden message and estimation of some of its parameters (e.g., message length and secret key). To our knowledge, so fa...
Aruna Ambalavanan, Rajarathnam Chandramouli
PROCEDIA
2010
97views more  PROCEDIA 2010»
15 years 4 days ago
Ontological musings on how nature computes
Modern physical theory and modern computational techniques are used to provide conjecture on how nature computes. I utilize time-domain simulation of physical phenomena and build ...
J. F. Nystrom