Sciweavers

8068 search results - page 1159 / 1614
» Java Data Objects
Sort
View
ICIP
2004
IEEE
16 years 6 months ago
A public-key authentication watermarking for binary images
Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
Hae Yong Kim, Ricardo L. de Queiroz
ICIP
2002
IEEE
16 years 6 months ago
Confidence measures for block matching motion estimation
This paper addresses the problem of deriving measures that express the degree of the reliability of motion vectors estimated by a Block Matching motion estimation method. We expre...
Ioannis Patras, Emile A. Hendriks, Reginald L. Lag...
130
Voted
ICIP
2000
IEEE
16 years 6 months ago
Registration of Digital Ophthalmic Images Using Vector Mapping
This paper outlines a technique for the automated alignment of digital images of the retina under the assumption that they differ spatially by a geometric global transform. This a...
Neil Ryan, Conor Heneghan, M. Cahill
ICIP
1994
IEEE
16 years 6 months ago
Tomographic Reconstruction Based on Flexible Geometric Models
When dealing with ill-posed inverse problems in data analysis, the Bayesian approach allows one to use prior information to guide the result toward reasonable solutions. In this w...
K. M. Hanson, G. S. Cunningham, G. R. Jennings Jr....
ICDE
2004
IEEE
124views Database» more  ICDE 2004»
16 years 6 months ago
Authenticating Query Results in Edge Computing
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not nec...
HweeHwa Pang, Kian-Lee Tan
« Prev « First page 1159 / 1614 Last » Next »