Sciweavers

490 search results - page 75 / 98
» Image Authentication Based on Distributed Source Coding
Sort
View
115
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
127
Voted
ICIP
2008
IEEE
16 years 3 months ago
Coding-gain-based complexity control for H.264 video encoder
The allowable computational complexity of video encoding is limited in a power-constrained system. Different video frames are associated with different motions and contexts, and s...
Ming-Chen Chien, Zong-Yi Chen, Pao-Chi Chang
SIBGRAPI
2006
IEEE
15 years 8 months ago
Actively Illuminated Objects using Graph-Cuts
This paper addresses the problem of foreground extraction using active illumination and graph-cut optimization. Our approach starts by detecting image regions that are likely to b...
Asla Medeiros Sá, Marcelo Bernardes Vieira,...
115
Voted
ICCV
2005
IEEE
16 years 4 months ago
Structured Light in Scattering Media
Virtually all structured light methods assume that the scene and the sources are immersed in pure air and that light is neither scattered nor absorbed. Recently, however, structur...
Srinivasa G. Narasimhan, Shree K. Nayar, Bo Sun, S...
142
Voted
WIKIS
2005
ACM
15 years 7 months ago
WikiWiki weaving heterogeneous software artifacts
Good documentation benefits every software development project, especially large ones, but it can be hard, costly, and tiresome to produce when not supported by appropriate tools...
Ademar Aguiar, Gabriel David