Sciweavers

2449 search results - page 335 / 490
» Tensor Embedding Methods
Sort
View
77
Voted
SADFE
2005
IEEE
15 years 3 months ago
Detecting Digital Tampering by Blur Estimation
With powerful computer and mighty software, seasoned users could turn digital media into what they want. The detection of digital tampering has become a crucial problem. In most o...
Dun-Yu Hsiao, Soo-Chang Pei
VISUALIZATION
2005
IEEE
15 years 3 months ago
Visualization of the Genus of Knots
The genus of a knot or link can be defined via Seifert surfaces. A Seifert surface of a knot or link is an oriented surface whose boundary coincides with that knot or link. Schem...
Jarke J. van Wijk, Arjeh M. Cohen
83
Voted
ISLPED
2005
ACM
103views Hardware» more  ISLPED 2005»
15 years 3 months ago
A non-uniform cache architecture for low power system design
This paper proposes a non-uniform cache architecture for reducing the power consumption of memory systems. The nonuniform cache allows having different associativity values (i.e.,...
Tohru Ishihara, Farzan Fallah
73
Voted
DRM
2005
Springer
15 years 3 months ago
Statistical audio watermarking algorithm based on perceptual analysis
In this paper, we describe a novel statistical audio watermarking scheme. Under the control of the masking thresholds, watermark is embedded adaptively and transparently in the pe...
Xiaomei Quan, Hongbin Zhang
DRMTICS
2005
Springer
15 years 3 months ago
Call Tree Transformation for Program Obfuscation and Copy Protection
In this paper we propose a new scheme for software obfuscation and license protection that is based on an original transformation of the program’s call tree. The idea is based on...
Valery Pryamikov