Sciweavers

1581 search results - page 202 / 317
» Domain semantics of possibility computations
Sort
View
91
Voted
ICIP
2007
IEEE
16 years 2 months ago
Estimating Steganographic Capacity for Odd-Even Based Embedding and its Use in Individual Compensation
We present a method to compute the steganographic capacity for images, with odd-even based hiding in the quantized discrete cosine transform domain. The method has been generalize...
Anindya Sarkar, B. S. Manjunath
93
Voted
DAC
2004
ACM
16 years 1 months ago
Characterizing embedded applications for instruction-set extensible processors
Extensible processors, which allow customization for an application domain by extending the core instruction set architecture, are becoming increasingly popular for embedded syste...
Pan Yu, Tulika Mitra
99
Voted
ICFP
2008
ACM
16 years 20 days ago
Pattern minimization problems over recursive data types
In the context of program verification in an interactive theorem prover, we study the problem of transforming function definitions with ML-style (possibly overlapping) pattern mat...
Alexander Krauss
105
Voted
EDOC
2007
IEEE
15 years 7 months ago
Model-Driven Engineering for Requirements Analysis
Requirements engineering (RE) encompasses a set of activities for eliciting, modelling, agreeing, communicating and validating requirements that precisely define the problem doma...
Benoit Baudry, Clémentine Nebut, Yves Le Tr...
82
Voted
ICC
2007
IEEE
15 years 7 months ago
Determination of Optimal Distortion-Based Protection in Progressive Image Transmission: a Heuristic Approach
— In this paper a method for the fast determination of distortion-based optimal unequal error protection (UEP) of bitstreams generated by embedded image coders is described. The ...
Alessio Torquati, Maria Fresia, Fabio Lavagetto