Sciweavers

1031 search results - page 52 / 207
» codes 2004
Sort
View
CVPR
2004
IEEE
15 years 2 months ago
Midstream Content Access of Visual Pattern Coded Imagery
Multimedia retrieval is going to play an increasingly important role in the future. Since the availability of digital media seems ever rising, not only the retrieval performance i...
Gerald Schaefer
ICIP
2004
IEEE
15 years 12 months ago
Improved dictionaries for generalized bitplanes-based matching pursuits video coding using ridgelets
A novel decomposition of functions using generalized bitplanes has been recently proposed. Such a decomposition maps a function into a set of indexes, thus performing quantization...
Leonardo H. Fonteles, Rogèrio Caetano, Edua...
ICSE
2004
IEEE-ACM
15 years 10 months ago
Assume-Guarantee Verification of Source Code with Design-Level Assumptions
Model checking is an automated technique that can be used to determine whether a system satisfies certain required properties. To address the "state explosion" problem a...
Dimitra Giannakopoulou, Corina S. Pasareanu, Jamie...
ECOWS
2004
Springer
15 years 3 months ago
Managers Don't Code: Making Web Services Middleware Applicable for End-Users
Today’s web-pages are primarily designed for occasional usage. Professional users therefore use special applications that use Web Services increasingly. As the number of internet...
Alexander Hilliger von Thile, Ingo Melzer, Hans-Pe...
FSE
2004
Springer
130views Cryptology» more  FSE 2004»
15 years 3 months ago
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
A cryptanalysis is given of a MAC proposal presented at CRYPTO 2003 by Cary and Venkatesan. A nice feature of the CaryVenkatesan MAC is that a lower bound on its security can be pr...
Simon R. Blackburn, Kenneth G. Paterson