Sciweavers

1629 search results - page 198 / 326
» Infeasible Code Detection
Sort
View
105
Voted
ICIP
2001
IEEE
16 years 3 months ago
Geometric hashing techniques for watermarking
In this paper we introduce the idea of using Computer Vision techniques for improving and enhancing watermarking capabilities. Specifically, we incorporate Geometric Hashing techn...
Hagit Zabrodsky Hel-Or, Y. Yitzhaki, Yacov Hel-Or
ICASSP
2009
IEEE
15 years 8 months ago
Rate efficient remote video file synchronization
Video file synchronization between remote users is an important task in many applications. Re-transmission of a video that has been only slightly modified is expensive, wasteful...
Hao Zhang, Chuohao Yeo, Kannan Ramchandran
ICC
2007
IEEE
154views Communications» more  ICC 2007»
15 years 8 months ago
Error Prediction Based Redundancy Control for Robust Transmission of Video Over Wireless Links
—The loss of UDP/IP packets has a high impact on the quality of the low-rate video streaming, since one UDP/IP packet typically represents a considerable part of a picture, which...
Olivia Nemethova, Wolfgang Karner, Markus Rupp
IPPS
2006
IEEE
15 years 7 months ago
Mapping DSP applications on processor systems with coarse-grain reconfigurable hardware
In this paper, we present performance results from mapping five real-world DSP applications on an embedded system-on-chip that incorporates coarse-grain reconfigurable logic with ...
Michalis D. Galanis, Grigoris Dimitroulakos, Const...
ICESS
2005
Springer
15 years 7 months ago
Self-correction of FPGA-Based Control Units
This paper presents a self-correcting control unit design using Hamming codes for finite state machine (FSM) state encoding. The adopted technique can correct single-bit errors and...
Iouliia Skliarova