Sciweavers

16843 search results - page 142 / 3369
» On Generalized Authorization Problems
Sort
View
133
Voted
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
15 years 9 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
IRI
2009
IEEE
15 years 11 months ago
Towards a General Entity Representation Model
In recent years, there is an increasing interest in the Semantic Web and the relevant technologies, which can have a significant impact in the context of information and knowledge...
Barbara Bazzanella, Themis Palpanas, Heiko Stoerme...
ICCVW
1999
Springer
15 years 9 months ago
Generalized Voxel Coloring
Image-based reconstruction from randomly scattered views is a challenging problem. We present a new algorithm that extends Seitz and Dyer’s Voxel Coloring algorithm. Unlike their...
W. Bruce Culbertson, Thomas Malzbender, Gregory G....
TIT
2011
119views more  TIT 2011»
14 years 12 months ago
Redundancy-Related Bounds for Generalized Huffman Codes
— This paper presents new lower and upper bounds for the compression rate of binary prefix codes optimized over memoryless sources according to various nonlinear codeword length...
Michael B. Baer
153
Voted
IJCNN
2006
IEEE
15 years 11 months ago
Patterns, Hypergraphs and Embodied General Intelligence
—It is proposed that the creation of Artificial General Intelligence (AGI) at the human level and ultimately beyond is a problem addressable via integrating computer science algo...
Ben Goertzel