Sciweavers

2449 search results - page 255 / 490
» Tensor Embedding Methods
Sort
View
128
Voted
IH
2004
Springer
15 years 7 months ago
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes
In this paper, we introduce a new feature-based steganalytic method for JPEG images and use it as a benchmark for comparing JPEG steganographic algorithms and evaluating their embe...
Jessica J. Fridrich
102
Voted
IJCNLP
2004
Springer
15 years 7 months ago
Phoneme-Based Transliteration of Foreign Names for OOV Problem
One problem seriously affecting CLIR performance is the processing of queries with embedded foreign names. A proper noun dictionary is never complete rendering name translation fr...
Wei Gao, Kam-Fai Wong, Wai Lam
CODES
2002
IEEE
15 years 7 months ago
Compiler-directed customization of ASIP cores
This paper presents an automatic method to customize embedded application-specific instruction processors (ASIPs) based on compiler analysis. ASIPs, also known as embedded soft c...
T. Vinod Kumar Gupta, Roberto E. Ko, Rajeev Barua
149
Voted
MICCAI
1999
Springer
15 years 6 months ago
A New Approach to 3D Sulcal Ribbon Finding from MR Images
Abstract. Sulcal medial surfaces are 3D thin convoluted ribbons embedded in cortical sulci, and they provide distinctive anatomical features of the brain. Here we propose a new app...
Xiaolan Zeng, Lawrence H. Staib, Robert T. Schultz...
RTAS
1998
IEEE
15 years 6 months ago
Bounding Loop Iterations for Timing Analysis
Static timing analyzers need to know the minimum and maximum number of iterations associated with each loop in a real-time program so accurate timing predictions can be obtained. ...
Christopher A. Healy, Mikael Sjödin, Viresh R...