Sciweavers

1414 search results - page 113 / 283
» Combining Intruder Theories
Sort
View
IROS
2006
IEEE
168views Robotics» more  IROS 2006»
15 years 6 months ago
Scanning the Environment with Two Independent Cameras - Biologically Motivated Approach
— In this paper we present a novel method for visual scanning and target tracking by means of independent pan-tilt cameras which mimic the chameleon visual system. We present a s...
Ofir Avni, Francesco Borrelli, Gadi Katzir, Ehud R...
MMM
2006
Springer
128views Multimedia» more  MMM 2006»
15 years 6 months ago
An improved distortion model for rate control of DCT-based video coding
This paper presents a rate control algorithm for the dominant discrete cosine transform (DCT) -based video coding. It is developed based on a more accurate rate-distortion (RD) mo...
Jun Xie, Liang-Tien Chia, Bu-Sung Lee
MMSEC
2006
ACM
148views Multimedia» more  MMSEC 2006»
15 years 6 months ago
Minimizing the embedding impact in steganography
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Jessica J. Fridrich
101
Voted
SIGECOM
2006
ACM
138views ECommerce» more  SIGECOM 2006»
15 years 6 months ago
Bid expressiveness and clearing algorithms in multiattribute double auctions
We investigate the space of two-sided multiattribute auctions, focusing on the relationship between constraints on the offers traders can express through bids, and the resulting c...
Yagil Engel, Michael P. Wellman, Kevin M. Lochner
111
Voted
GLVLSI
2005
IEEE
97views VLSI» more  GLVLSI 2005»
15 years 6 months ago
On equivalence checking and logic synthesis of circuits with a common specification
In this paper we develop a theory of equivalence checking (EC) and logic synthesis of circuits with a common specification (CS). We show that two combinational circuits N1, N2 have...
Eugene Goldberg