Sciweavers

20778 search results - page 4146 / 4156
» Algorithms for Data Migration
Sort
View
TCSV
2010
14 years 4 months ago
No-Reference Quality Assessment of H.264/AVC Encoded Video
Abstract--This paper proposes a no-reference quality assessment metric for digital video subject to H.264/AVC encoding. The proposed metric comprises two main steps: coding error e...
Tomás Brandão, Tiago Rosa Maria Paul...
TIP
2010
113views more  TIP 2010»
14 years 4 months ago
Multiplicative Noise Removal Using Variable Splitting and Constrained Optimization
Multiplicative noise (also known as speckle noise) models are central to the study of coherent imaging systems, such as synthetic aperture radar and sonar, and ultrasound and laser...
José M. Bioucas-Dias, Mário A. T. Fi...
TIT
2010
130views Education» more  TIT 2010»
14 years 4 months ago
Pseudo-random functions and parallelizable modes of operations of a block cipher
This paper considers the construction and analysis of pseudo-random functions (PRFs) with specific reference to modes of operations of a block cipher. In the context of message aut...
Palash Sarkar
TOG
2010
117views more  TOG 2010»
14 years 4 months ago
Multi-feature matching of fresco fragments
We present a multiple-feature approach for determining matches between small fragments of archaeological artifacts such as Bronze-Age and Roman frescoes. In contrast with traditio...
Corey Toler-Franklin, Benedict J. Brown, Tim Weyri...
TSP
2010
14 years 4 months ago
Improving wireless physical layer security via cooperating relays
Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel c...
Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent...
« Prev « First page 4146 / 4156 Last » Next »