Sciweavers

1776 search results - page 248 / 356
» Informational cascades in IT adoption
Sort
View
IWDW
2004
Springer
15 years 7 months ago
Watermarking Attack: Security of WSS Techniques
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proport...
François Cayre, Caroline Fontaine, Teddy Fu...
KES
2004
Springer
15 years 7 months ago
A Hybrid Learning Approach for TV Program Personalization
The rapid growth of communication technologies and the invention of set-top-box (STB) and personal digital recorder (PDR) have enabled today’s television to receive and store tre...
Zhiwen Yu, Xingshe Zhou, Zhiyi Yang
PCM
2004
Springer
106views Multimedia» more  PCM 2004»
15 years 7 months ago
Performance Improvement of Vector Quantization by Using Threshold
Abstract. Vector quantization (VQ) is an elementary technique for image compression. However, the complexity of searching the nearest codeword in a codebook is time-consuming. In t...
Hung-Yi Chang, Pi-Chung Wang, Rong-Chang Chen, Shu...
117
Voted
CSB
2003
IEEE
113views Bioinformatics» more  CSB 2003»
15 years 7 months ago
An Optimal DNA Segmentation Based on the MDL Principle
: The biological world is highly stochastic and inhomogeneous in its behaviour. There are regions in DNA with high concentration of G or C bases; stretches of sequences with an abu...
Wojciech Szpankowski, Wenhui Ren, Lukasz Szpankows...
DSRT
2003
IEEE
15 years 7 months ago
Interest Management in Agent-Based Distributed Simulations
Distributed simulation enables participants situated in different geographical locations to share a common virtual world, which is called a Distributed Virtual Environment (DVE). ...
Lihua Wang, Stephen John Turner, Fang Wang