Sciweavers

490 search results - page 75 / 98
» Image Authentication Based on Distributed Source Coding
Sort
View
83
Voted
ICSE
2008
IEEE-ACM
15 years 10 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
ICIP
2008
IEEE
15 years 11 months ago
Coding-gain-based complexity control for H.264 video encoder
The allowable computational complexity of video encoding is limited in a power-constrained system. Different video frames are associated with different motions and contexts, and s...
Ming-Chen Chien, Zong-Yi Chen, Pao-Chi Chang
SIBGRAPI
2006
IEEE
15 years 3 months ago
Actively Illuminated Objects using Graph-Cuts
This paper addresses the problem of foreground extraction using active illumination and graph-cut optimization. Our approach starts by detecting image regions that are likely to b...
Asla Medeiros Sá, Marcelo Bernardes Vieira,...
ICCV
2005
IEEE
15 years 11 months ago
Structured Light in Scattering Media
Virtually all structured light methods assume that the scene and the sources are immersed in pure air and that light is neither scattered nor absorbed. Recently, however, structur...
Srinivasa G. Narasimhan, Shree K. Nayar, Bo Sun, S...
WIKIS
2005
ACM
15 years 3 months ago
WikiWiki weaving heterogeneous software artifacts
Good documentation benefits every software development project, especially large ones, but it can be hard, costly, and tiresome to produce when not supported by appropriate tools...
Ademar Aguiar, Gabriel David