Sciweavers

151 search results - page 10 / 31
» From Monads to Effects and Back
Sort
View
ICMCS
2005
IEEE
106views Multimedia» more  ICMCS 2005»
15 years 4 months ago
Watermarking based Image Authentication using Feature Amplification
In a typical content and watermarking based image authentication approach, a feature is extracted from the given image, and then embedded back into the image using a watermarking ...
Shuiming Ye, Ee-Chien Chang, Qibin Sun
74
Voted
ICFP
2006
ACM
15 years 10 months ago
Modelling deterministic concurrent I/O
The problem of expressing I/O and side effects in functional languages is a well-established one. This paper addresses this problem from a general semantic viewpoint by giving a u...
Malcolm Dowse, Andrew Butterfield
ICFP
2008
ACM
15 years 10 months ago
Ynot: dependent types for imperative programs
We describe an axiomatic extension to the Coq proof assistant, that supports writing, reasoning about, and extracting higher-order, dependently-typed programs with side-effects. C...
Aleksandar Nanevski, Greg Morrisett, Avraham Shinn...
94
Voted
MICCAI
2003
Springer
15 years 11 months ago
Tensor Splats: Visualising Tensor Fields by Texture Mapped Volume Rendering
Abstract. We describe a new method for visualising tensor fields using a textured mapped volume rendering approach, tensor-splatting. We use an image order method to calculate the ...
Abhir Bhalerao, Carl-Fredrik Westin
ICASSP
2008
IEEE
15 years 4 months ago
A covariance kernel for SVM language recognition
Discriminative training for language recognition has been a key tool for improving system performance. In addition, recognition directly from shifted-delta cepstral features has p...
William M. Campbell