Sciweavers

44 search results - page 6 / 9
» Face Hallucination: Theory and Practice
Sort
View
FC
1998
Springer
164views Cryptology» more  FC 1998»
15 years 1 months ago
Robustness and Security of Digital Watermarks
Digital watermarking is a nascent but promising technology that offers protection of unencrypted digital content. This paper is a brief technical survey of the multimedia watermark...
Lesley R. Matheson, Stephen G. Mitchell, Talal Sha...
IOR
2007
95views more  IOR 2007»
14 years 9 months ago
Index Policies for Shooting Problems
We consider a scenario in which a single Red wishes to shoot at a collection of Blue targets, one at a time, to maximise some measure of return obtained from Blues killed before R...
Kevin D. Glazebrook, Christopher Kirkbride, H. M. ...
ICASSP
2008
IEEE
15 years 3 months ago
Compressive coded aperture superresolution image reconstruction
Recent work in the emerging field of compressive sensing indicates that, when feasible, judicious selection of the type of distortion induced by measurement systems may dramatica...
Roummel F. Marcia, Rebecca Willett
IEEECIT
2010
IEEE
14 years 8 months ago
The Curriculum Reform of Database System Principle Based on Paperless Examination Platform
—Database technology is the significant part of computer science and technology, as the core technology of information management, database technology is widely used in the field...
Haifeng Ke, Gaoyan Zhang, Minghui Wu
CIKM
2011
Springer
13 years 9 months ago
Building directories for social tagging systems
Today, a number of algorithms exist for constructing tag hierarchies from social tagging data. While these algorithms were designed with ontological goals in mind, we know very li...
Denis Helic, Markus Strohmaier