Sciweavers

2478 search results - page 345 / 496
» Message from the Chair
Sort
View
105
Voted
ICIP
2005
IEEE
16 years 2 months ago
Watermarking JBIG2 text region for image authentication
An authentication watermarking technique (AWT) inserts hidden data into an image in order to detect any accidental or malicious alteration to the image. AWT usually computes, usin...
Sergio Vicente Denser Pamboukian, Hae Yong Kim, Ri...
99
Voted
ICIP
2002
IEEE
16 years 2 months ago
Semi-fragile image authentication using generic wavelet domain features and ECC
In this paper we present a generic content-based solution targeting at authenticating image in a semi-fragile way, which integrates watermarking-based approach with signature-base...
Qibin Sun, Shih-Fu Chang
187
Voted
ICDE
2008
IEEE
103views Database» more  ICDE 2008»
16 years 2 months ago
Processing Diagnosis Queries: A Principled and Scalable Approach
Abstract-- Many popular Web sites suffer occasional uservisible problems such as slow responses, blank pages or error messages being displayed, items not being added to shopping ca...
Shivnath Babu, Songyun Duan, Kamesh Munagala
217
Voted
ICDE
2007
IEEE
111views Database» more  ICDE 2007»
16 years 2 months ago
Scoop: An Adaptive Indexing Scheme for Stored Data in Sensor Networks
We present the design of Scoop, a system for indexing and querying stored data in sensor networks. Scoop works by collecting statistics about the rate of queries and distribution ...
Thomer M. Gil, Samuel Madden
186
Voted
ICDE
2006
IEEE
186views Database» more  ICDE 2006»
16 years 2 months ago
Energy-Efficient Continuous Isoline Queries in Sensor Networks
Environmental monitoring is a promising application for sensor networks. Many scenarios produce geographically correlated readings, making them visually interesting and good targe...
Adam Silberstein, Jun Yang 0001, Rebecca Braynard