Sciweavers

679 search results - page 110 / 136
» Algorithmic modifications to SPIHT
Sort
View
SSWMC
2004
15 years 4 months ago
Universal image steganalysis using rate-distortion curves
The goal of image steganography is to embed information in a cover image using modifications that are undetectable. In actual practice, however, most techniques produce stego imag...
Mehmet Utku Celik, Gaurav Sharma, A. Murat Tekalp
WSCG
2004
155views more  WSCG 2004»
15 years 4 months ago
NURBS Fairing by Knot Vector Optimization
The shape of a NURBS curve or patch is defined by the location of its control points, the weights associated with these points, and the parameter intervals, also called the knot v...
Barnabás Aszódi, Szabolcs Czuczor, L...
WSCG
2003
149views more  WSCG 2003»
15 years 4 months ago
Boolean Operations on Feature-based Models
Boolean operations and feature-based modeling are closely linked domains. For example, several, sometimes many Boolean operations are involved during a feature instantiation or mo...
Yvon Gardan, Christian Minich, Estelle Perrin
128
Voted
NETWORKING
2000
15 years 4 months ago
Real-Time Traffic Transmission over the Internet
Abstract. Multimedia applications require the transmission of realtime streams over a network. These streams often exhibit variable bandwidth requirements, and require high bandwid...
Marco Furini, Donald F. Towsley
ATAL
2010
Springer
15 years 4 months ago
Cultivating desired behaviour: policy teaching via environment-dynamics tweaks
In this paper we study, for the first time explicitly, the implications of endowing an interested party (i.e. a teacher) with the ability to modify the underlying dynamics of the ...
Zinovi Rabinovich, Lachlan Dufton, Kate Larson, Ni...