Sciweavers

937 search results - page 131 / 188
» IT Service Processes - State and Open Issues
Sort
View
ICIP
2004
IEEE
16 years 6 months ago
Steganalysis of quantization index modulation data hiding
Quantization index modulation (QIM) techniques have been gaining popularity in the data hiding community because of their robustness and information-theoretic optimality against a...
Kenneth Sullivan, Zhiqiang Bi, Upamanyu Madhow, Sh...
MIR
2005
ACM
143views Multimedia» more  MIR 2005»
15 years 10 months ago
Extracting information from multimedia meeting collections
Multimedia meeting collections, composed of unedited audio and video streams, handwritten notes, slides, and electronic documents that jointly constitute a raw record of complex h...
Daniel Gatica-Perez, Dong Zhang, Samy Bengio
114
Voted
IJCNLP
2005
Springer
15 years 10 months ago
A Lexicon-Constrained Character Model for Chinese Morphological Analysis
Abstract. This paper proposes a lexicon-constrained character model that combines both word and character features to solve complicated issues in Chinese morphological analysis. A ...
Yao Meng, Hao Yu, Fumihito Nishino
135
Voted
WIESS
2000
15 years 6 months ago
Operational Information Systems: An Example from the Airline Industry
Our research is motivated by the scaleability, availability, and extensibility challenges in deploying open systems based, enterprise operational applications. We present Delta�...
Van Oleson, Karsten Schwan, Greg Eisenhauer, Beth ...
ICIP
2001
IEEE
16 years 6 months ago
Sprite generation for frame-based video coding
Sprite coding is a very efficient method for the representation and compression of background video object, which has been accepted by MPEG-4 standard. However, how to automatical...
Yan Lu, Wen Gao, Feng Wu