Sciweavers

3359 search results - page 374 / 672
» A Simplified Idea Algorithm
Sort
View
IH
1999
Springer
15 years 7 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel
INFOCOM
1998
IEEE
15 years 7 months ago
Demand-based Radio Network Planning of Cellular Mobile Communication Systems
: This paper presents a demand-based engineering method for designing radio networks of cellularmobile communicationsystems. The proposed procedure is based on a forward-engineerin...
Kurt Tutschku
DCC
1997
IEEE
15 years 7 months ago
Text Compression Via Alphabet Re-Representation
d abstract Philip M. Long Apostol I. Natsevy Je rey Scott Vittery We consider re-representing the alphabet so that a representation of a character re ects its properties as a pr...
Philip M. Long, Apostol Natsev, Jeffrey Scott Vitt...
HICSS
1997
IEEE
107views Biometrics» more  HICSS 1997»
15 years 7 months ago
On Heuristic Mapping of Decision Surfaces for Post-Evaluation Analysis
The value for decision making of high-quality postsolution analysis of decision-supporting models can hardly be overestimated. Candle-lighting analysis (CLA) takes this notion ver...
Major Bill Branley, Russell Fradin, Steven O. Kimb...
RT
1997
Springer
15 years 7 months ago
Incremental Updates to Scenes Illuminated by Area Light Sources
Abstract: An object space algorithm for computing shadows in dynamic scenes illuminated by area light sources is presented. A mesh with the shadow boundaries as well as other disco...
Yiorgos Chrysanthou, Mel Slater