Sciweavers

1917 search results - page 164 / 384
» Compressive Wave Computation
Sort
View
IPL
2010
107views more  IPL 2010»
15 years 2 months ago
Collisions for variants of the BLAKE hash function
In this paper we present an attack to the BLOKE and BRAKE hash functions, which are weakened versions of the SHA-3 candidate BLAKE. In difference to BLAKE, the BLOKE hash functio...
Janos Vidali, Peter Nose, Enes Pasalic
CORR
2012
Springer
220views Education» more  CORR 2012»
13 years 11 months ago
A Bijective String Sorting Transform
Given a string of characters, the Burrows-Wheeler Transform rearranges the characters in it so as to produce another string of the same length which is more amenable to compressio...
Joseph Yossi Gil, David Allen Scott
153
Voted
ICIP
2004
IEEE
16 years 5 months ago
Face detection in the compressed domain
Face detection is important in many algorithms in the areas of machine object recognition and pattern recognition. The kaleidoscope of applications for face detection extends acro...
Pedro Fonseca, Jan Nesvadba
ICIP
1997
IEEE
16 years 5 months ago
A Multi-Threshold Wavelet Coder ( MTWC ) For High Fidelity Image Compression
An embedded wavelet coder algorithm which adopts different threshold values in different subbands is proposed in this work. The new image coder, called the multi-threshold wavelet...
H.-J. Wang, C.-C. Kuo
KDD
2006
ACM
153views Data Mining» more  KDD 2006»
16 years 4 months ago
Model compression
Often the best performing supervised learning models are ensembles of hundreds or thousands of base-level classifiers. Unfortunately, the space required to store this many classif...
Cristian Bucila, Rich Caruana, Alexandru Niculescu...