Sciweavers

6047 search results - page 951 / 1210
» Modeling with Extend
Sort
View
167
Voted
ICIP
2003
IEEE
16 years 5 months ago
Halftone visual cryptography
This paper considers the problem of encoding a secret binary image SI into n shares of meaningful halftone images within the scheme of visual cryptography (VC). Secret pixels enco...
Z. Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo
140
Voted
ICIP
1999
IEEE
16 years 5 months ago
Long-Term Memory Prediction Using Affine Motion Compensation
Long-term memory prediction extends motion compensation from the previous frame to several past frames with the result of increased coding efficiency. In this paper we demonstrate...
Thomas Wiegand, Eckehard G. Steinbach, Bernd Girod
136
Voted
ICIP
1998
IEEE
16 years 5 months ago
Adaptive Wavelet Packet Image Coding using an Estimation-Quantization Framework
In this paper, we extend the statistical model-based Estimation-Quantization (EQ) wavelet image coding algorithm introduced in [?] to include an adaptive transform component. For ...
Kannan Ramchandran, Mehmet Kivanç Mih&ccedi...
238
Voted
ICDE
2008
IEEE
161views Database» more  ICDE 2008»
16 years 5 months ago
Efficiently Answering Probabilistic Threshold Top-k Queries on Uncertain Data
on Uncertain Data (Extended Abstract) Ming Hua Jian Pei Wenjie Zhang Xuemin Lin Simon Fraser University, Canada The University of New South Wales & NICTA {mhua, jpei}@cs.sfu.c...
Ming Hua, Jian Pei, Wenjie Zhang, Xuemin Lin
229
Voted
ICDE
2007
IEEE
111views Database» more  ICDE 2007»
16 years 5 months ago
Proof Sketches: Verifiable In-Network Aggregation
Recent work on distributed, in-network aggregation assumes a benign population of participants. Unfortunately, modern distributed systems are plagued by malicious participants. In...
Minos N. Garofalakis, Joseph M. Hellerstein, Petro...