Sciweavers

1560 search results - page 273 / 312
» Example-based image compression
Sort
View
133
Voted
FC
1998
Springer
164views Cryptology» more  FC 1998»
15 years 6 months ago
Robustness and Security of Digital Watermarks
Digital watermarking is a nascent but promising technology that offers protection of unencrypted digital content. This paper is a brief technical survey of the multimedia watermark...
Lesley R. Matheson, Stephen G. Mitchell, Talal Sha...
AI50
2006
15 years 6 months ago
Adaptive Multi-modal Sensors
Compressing real-time input through bandwidth constrained connections has been studied within robotics, wireless sensor networks, and image processing. When there are bandwidth con...
Kyle Ira Harrington, Hava T. Siegelmann
112
Voted
CGI
2004
IEEE
15 years 6 months ago
Probabilistic Motion Sequence Generation
Creating long animation sequences with non-trivial repetitions is a time consuming and often difficult task. This is true for 2D images and even more true for 3D sequences. Based ...
Mirko Sattler, Ralf Sarlette, Reinhard Klein
98
Voted
UIST
1995
ACM
15 years 5 months ago
Hands-on Demonstration: Interacting with SpeechSkimmer
SpeechSkimmer is an interactive system for quickly browsing and finding information in speech recordings. Skimming speech recordings is much more difficult than visually scanning ...
Barry Arons
110
Voted
ICPR
2010
IEEE
15 years 4 months ago
A Fast Extension for Sparse Representation on Robust Face Recognition
We extend a recent Sparse Representation-based Classification (SRC) algorithm for face recognition to work on 2D images directly, aiming to reduce the computational complexity whil...
Hui-Ning Qiu, Duc-Son Pham, Wanquan Liu, Svetha Ve...