Sciweavers

2060 search results - page 127 / 412
» Some Applications of Coding Theory in Computational Complexi...
Sort
View
MMSEC
2006
ACM
148views Multimedia» more  MMSEC 2006»
15 years 3 months ago
Minimizing the embedding impact in steganography
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Jessica J. Fridrich
ICASSP
2008
IEEE
15 years 4 months ago
Transmit codes and receive filters for pulse compression radar systems
Pulse compression radar systems make use of transmit code sequences and receive filters that are specially designed to achieve good range resolution and target detection capabili...
Petre Stoica, Jian Li, Ming Xue
NSF
1994
Springer
151views Computer Vision» more  NSF 1994»
15 years 2 months ago
Algebraic Geometry and Object Representation in Computer Vision
The goal of algebraic geometry is to gain an understanding of the behaviour of functions related by polynomial relationships. Algebraic curves and surfaces having considerable adva...
Sylvain Petitjean
ATAL
2003
Springer
15 years 3 months ago
Miscomputing ratio: social cost of selfish computing
Auctions are useful mechanism for allocating items (goods, tasks, resources, etc.) in multiagent systems. The bulk of auction theory assumes that the bidders’ valuations for ite...
Kate Larson, Tuomas Sandholm
TIT
2002
126views more  TIT 2002»
14 years 9 months ago
Two-dimensional interleaving schemes with repetitions: Constructions and bounds
Abstract--Two-dimensional interleaving schemes with repetitions are considered. These schemes are required for the correction of two-dimensional bursts (or clusters) of errors in a...
Tuvi Etzion, Alexander Vardy