Sciweavers

3373 search results - page 501 / 675
» Linear transformations on codes
Sort
View
JIPS
2010
273views more  JIPS 2010»
14 years 5 months ago
Hiding Secret Data in an Image Using Codeword Imitation
This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to...
Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai
80
Voted
ICASSP
2011
IEEE
14 years 1 months ago
SEAMLESS P2P-MDVC with well-balanced descriptions
Multiple-description coding (MDC) provides a promising solution to support the error-prone transmission over multiple channels. One extremely important application is to design ef...
Shuyuan Zhu, Jeff Siu-Kei Au-Yeung, Bing Zeng
81
Voted
ISCA
2011
IEEE
225views Hardware» more  ISCA 2011»
14 years 1 months ago
FlexBulk: intelligently forming atomic blocks in blocked-execution multiprocessors to minimize squashes
Blocked-execution multiprocessor architectures continuously run atomic blocks of instructions — also called Chunks. Such architectures can boost both performance and software pr...
Rishi Agarwal, Josep Torrellas
EICS
2011
ACM
14 years 1 months ago
Hayaku: designing and optimizing finely tuned and portable interactive graphics with a graphical compiler
Although reactive and graphically rich interfaces are now mainstream, their development is still a notoriously difficult task. This paper presents Hayaku, a toolset that supports...
Benjamin Tissoires, Stéphane Conversy
FAST
2011
14 years 1 months ago
Making the Common Case the Only Case with Anticipatory Memory Allocation
We present Anticipatory Memory Allocation (AMA), a new method to build kernel code that is robust to memoryallocation failures. AMA avoids the usual difficulties in handling allo...
Swaminathan Sundararaman, Yupu Zhang, Sriram Subra...