Sciweavers

3984 search results - page 691 / 797
» A Model-Driven Transformation Method
Sort
View
127
Voted
ICIP
2002
IEEE
15 years 9 months ago
Wavelet-domain reconstruction of lost blocks in wireless image transmission and packet-switched networks
— A fast scheme for wavelet-domain interpolation of lost image blocks in wireless image transmission is presented in this paper. The algorithm is designed to be compatible with t...
Shantanu Rane, Jeremiah Remus, Guillermo Sapiro
IEEEMSP
2002
IEEE
113views Multimedia» more  IEEEMSP 2002»
15 years 9 months ago
A minimum distortion data hiding technique for compressed images
We present a blind data hiding method for JPEG compressedimageswhichminimizesthe perceptualdistortion due to data embedding.The proposed systempresentsa number of op. tions to the ...
Cagatay Candan, Nikil Jayant
ISSRE
2002
IEEE
15 years 9 months ago
Mutation of Java Objects
Fault insertion based techniqueshave been used for measuring test adequacy and testability of programs. Mutation analysis inserts faults into a program with the goal of creating m...
Roger T. Alexander, James M. Bieman, Sudipto Ghosh...
ISSS
2002
IEEE
148views Hardware» more  ISSS 2002»
15 years 9 months ago
A Case Study of Hardware and Software Synthesis in ForSyDe
ForSyDe (FORmal SYstem DEsign) is a methodology which addresses the design of SoC applications which may contain control as well as data flow dominated parts. Starting with a for...
Ingo Sander, Axel Jantsch, Zhonghai Lu
ASIACRYPT
2001
Springer
15 years 8 months ago
Supersingular Curves in Cryptography
Abstract. Frey and R¨uck gave a method to transform the discrete logarithm problem in the divisor class group of a curve over Fq into a discrete logarithm problem in some finite ...
Steven D. Galbraith