Sciweavers

954 search results - page 72 / 191
» From brains to bytes
Sort
View
DCC
2005
IEEE
15 years 3 months ago
JPEG2000 and Motion JPEG2000 Content Analysis Using Codestream Length Information
The widespread adoption of the JPEG2000 standard calls for the development of computationally efficient algorithms to analyze the content of imagery compressed using this standard...
Ali Tabesh, Ali Bilgin, Karthik Krishnan, Michael ...
GPCE
2005
Springer
15 years 3 months ago
Source-Level Optimization of Run-Time Program Generators
Abstract. We describe our efforts to use source-level rewriting to optimize run-time program generators written in Jumbo, a run-time program generation system for Java. Jumbo is a...
Samuel N. Kamin, Baris Aktemur, Philip Morton
COMPSAC
2000
IEEE
15 years 2 months ago
LRU-SP: A Size-Adjusted and Popularity-Aware LRU Replacement Algorithm for Web Caching
This paper presents LRU-SP, a size-adjusted and popularity-aware extension to Least Recently Used (LRU) for caching web objects. The standard LRU, focusing on recently used and eq...
Kai Cheng, Yahiko Kambayashi
DGCI
1999
Springer
15 years 2 months ago
A Topological Method of Surface Representation
A new method of representing a surface in the 3D space as a single digitally continuous sequence of faces is described. The method is based on topological properties of quasi-manif...
Vladimir Kovalevsky
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
15 years 1 months ago
Cryptanalysis of the Stream Cipher DECIM
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. I...
Hongjun Wu, Bart Preneel