Sciweavers

1717 search results - page 286 / 344
» Error concealment using a diffusion based method
Sort
View
APCCAS
2002
IEEE
156views Hardware» more  APCCAS 2002»
15 years 2 months ago
Bit-plane watermarking for zerotree-coded images
In this paper, we develop a robust bit-plane watermarking technique based on zerotree coding. A robust watermark is an imperceptible but indelible code that can be used for owners...
Shih-Hsuan Yang, Hsin-Chang Chen
EOR
2006
104views more  EOR 2006»
14 years 9 months ago
Link function selection in stochastic multicriteria decision making models
A stochastic formulation of the Analytic Hierarchy Process (AHP) using an approach based on Bayesian categorical data models has been developed. However, in categorical data model...
Eugene D. Hahn
JCP
2008
142views more  JCP 2008»
14 years 9 months ago
QoS Aware Query Processing Algorithm for Wireless Sensor Networks
In sensor networks, continuous query is commonly used for collecting periodical data from the objects under monitoring. This sort of queries needs to be carefully designed, in orde...
Jun-Zhao Sun
IJCV
1998
98views more  IJCV 1998»
14 years 9 months ago
Exploiting Discontinuities in Optical Flow
Most optical flow estimation techniques have substantial difficulties dealing with flow discontinuities. Methods which simultaneously detect flow boundaries and use the detect...
William B. Thompson
FM
1997
Springer
258views Formal Methods» more  FM 1997»
15 years 2 months ago
Consistent Graphical Specification of Distributed Systems
: The widely accepted possible benefits of formal methods on the one hand and their minor use compared to informal or graphical description techniques on the other hand have repeat...
Franz Huber, Bernhard Schätz, Geralf Einert