Sciweavers

3735 search results - page 642 / 747
» Order compression schemes
Sort
View
101
Voted
MVA
2007
119views Computer Vision» more  MVA 2007»
15 years 2 months ago
Wavelet-Based Multiresolution Features for Detecting Duplications in Images
Duplication of image regions is a common method for manipulating original images using typical software like Adobe Photoshop. In this study, we propose a wavelet based feature rep...
Md. Khayrul Bashar, Keiji Noda, Noboru Ohnishi, Hi...
110
Voted
SODA
2008
ACM
156views Algorithms» more  SODA 2008»
15 years 2 months ago
Approximating TSP on metrics with bounded global growth
The Traveling Salesman Problem (TSP) is a canonical NP-complete problem which is known to be MAXSNP hard even on Euclidean metrics (of high dimensions) [40]. In order to circumven...
T.-H. Hubert Chan, Anupam Gupta
100
Voted
SECRYPT
2007
121views Business» more  SECRYPT 2007»
15 years 2 months ago
Using Steganography to Improve Hash Functions' Collision Resistance
Lately, hash function security has received increased attention. Especially after the recent attacks that were presented for SHA-1 and MD5, the need for a new and more robust hash...
Emmanouel Kellinis, Konstantinos Papapanagiotou
AAAI
2006
15 years 2 months ago
Weighted Constraint Satisfaction with Set Variables
Set variables are ubiquitous in modeling (soft) constraint problems, but efforts on practical consistency algorithms for Weighted Constraint Satisfaction Problems (WCSPs) have onl...
J. H. M. Lee, C. F. K. Siu
88
Voted
CSREAESA
2004
15 years 2 months ago
A High Performance, Low Area Overhead Carry Lookahead Adder
Adders are some of the most critical data path circuits requiring considerable design effort in order to "squeeze" out as much performance gain as possible. Many adder d...
James Levy, Jabulani Nyathi