Sciweavers

3373 search results - page 501 / 675
» Linear transformations on codes
Sort
View
117
Voted
JIPS
2010
273views more  JIPS 2010»
14 years 10 months ago
Hiding Secret Data in an Image Using Codeword Imitation
This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to...
Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai
ICASSP
2011
IEEE
14 years 7 months ago
SEAMLESS P2P-MDVC with well-balanced descriptions
Multiple-description coding (MDC) provides a promising solution to support the error-prone transmission over multiple channels. One extremely important application is to design ef...
Shuyuan Zhu, Jeff Siu-Kei Au-Yeung, Bing Zeng
ISCA
2011
IEEE
225views Hardware» more  ISCA 2011»
14 years 7 months ago
FlexBulk: intelligently forming atomic blocks in blocked-execution multiprocessors to minimize squashes
Blocked-execution multiprocessor architectures continuously run atomic blocks of instructions — also called Chunks. Such architectures can boost both performance and software pr...
Rishi Agarwal, Josep Torrellas
190
Voted
EICS
2011
ACM
14 years 6 months ago
Hayaku: designing and optimizing finely tuned and portable interactive graphics with a graphical compiler
Although reactive and graphically rich interfaces are now mainstream, their development is still a notoriously difficult task. This paper presents Hayaku, a toolset that supports...
Benjamin Tissoires, Stéphane Conversy
246
Voted
FAST
2011
14 years 6 months ago
Making the Common Case the Only Case with Anticipatory Memory Allocation
We present Anticipatory Memory Allocation (AMA), a new method to build kernel code that is robust to memoryallocation failures. AMA avoids the usual difficulties in handling allo...
Swaminathan Sundararaman, Yupu Zhang, Sriram Subra...