Sciweavers

490 search results - page 45 / 98
» Image Authentication Based on Distributed Source Coding
Sort
View
56
Voted
EUC
2004
Springer
15 years 3 months ago
On the Effects of Bandwidth Reduction Techniques in Distributed Applications
Communication optimization plays an important role in building networked distributed applications. In this paper, we systematically evaluate four bandwidth reduction algorithms, n...
Hanping Lufei, Weisong Shi, Lucia Zamorano
87
Voted
INFOCOM
2009
IEEE
15 years 4 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
CSCW
2012
ACM
13 years 5 months ago
Social coding in GitHub: transparency and collaboration in an open software repository
Social applications on the web let users track and follow the activities of a large number of others regardless of location or affiliation. There is a potential for this transpare...
Laura A. Dabbish, H. Colleen Stuart, Jason Tsay, J...
82
Voted
ICASSP
2011
IEEE
14 years 1 months ago
Snapshot spectral imaging via compressive random convolution
Spectral imaging is of interest in many applications, including wide-area airborne surveillance, remote sensing, and tissue spectroscopy. Coded aperture spectral snapshot imaging ...
Yao Wu, Gonzalo R. Arce
CVPR
2003
IEEE
15 years 11 months ago
Low-Dimensional Representations of Shaded Surfaces under Varying Illumination
The aim of this paper is to find the best representation for the appearance of surfaces with Lambertian reflectance under varying illumination. Previous work using principal compo...
Peter Nillius, Jan-Olof Eklundh