Sciweavers

2237 search results - page 360 / 448
» On the Security of Random Sources
Sort
View
JEI
2006
128views more  JEI 2006»
14 years 9 months ago
Performance study of common image steganography and steganalysis techniques
Abstract. We investigate the performance of state of the art universal steganalyzers proposed in the literature. These universal steganalyzers are tested against a number of well-k...
Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
IJCV
2007
178views more  IJCV 2007»
14 years 9 months ago
Stereo for Image-Based Rendering using Image Over-Segmentation
In this paper, we propose a stereo method specifically designed for image-based rendering. For effective image-based rendering, the interpolated views need only be visually plaus...
C. Lawrence Zitnick, Sing Bing Kang
TASLP
2008
61views more  TASLP 2008»
14 years 9 months ago
Spectral Representations of Nonmodal Phonation
Abstract--Regions of nonmodal phonation, which exhibit deviations from uniform glottal-pulse periods and amplitudes, occur often in speech and convey information about linguistic c...
Nicolas Malyska, Thomas F. Quatieri
TCS
2008
14 years 9 months ago
Learning recursive functions: A survey
Studying the learnability of classes of recursive functions has attracted considerable interest for at least four decades. Starting with Gold's (1967) model of learning in th...
Thomas Zeugmann, Sandra Zilles
TPDS
2008
136views more  TPDS 2008»
14 years 9 months ago
Data Gathering with Tunable Compression in Sensor Networks
We study the problem of constructing a data gathering tree over a wireless sensor network in order to minimize the total energy for compressing and transporting information from a ...
Yang Yu, Bhaskar Krishnamachari, Viktor K. Prasann...