Sciweavers

12289 search results - page 2217 / 2458
» computing 2006
Sort
View
JEI
2008
129views more  JEI 2008»
15 years 2 months ago
Removable visible image watermarking algorithm in the discrete cosine transform domain
Abstract. A removable visible watermarking scheme, which operates in the discrete cosine transform (DCT) domain, is proposed for combating copyright piracy. First, the original wat...
Ying Yang, Xingming Sun, Hengfu Yang, Chang-Tsun L...
KBS
2008
98views more  KBS 2008»
15 years 2 months ago
Mixed feature selection based on granulation and approximation
Feature subset selection presents a common challenge for the applications where data with tens or hundreds of features are available. Existing feature selection algorithms are mai...
Qinghua Hu, Jinfu Liu, Daren Yu
PRL
2010
310views more  PRL 2010»
15 years 2 months ago
A Lagrangian Half-Quadratic approach to robust estimation and its applications to road scene analysis
We consider the problem of fitting linearly parameterized models, that arises in many computer vision problems such as road scene analysis. Data extracted from images usually cont...
Jean-Philippe Tarel, Pierre Charbonnier
ICMCS
2009
IEEE
159views Multimedia» more  ICMCS 2009»
15 years 1 months ago
Large-scale near-duplicate web video search: Challenge and opportunity
The massive amount of near-duplicate and duplicate web videos has presented both challenge and opportunity to multimedia computing. On one hand, browsing videos on Internet become...
Wanlei Zhao, Song Tan, Chong-Wah Ngo
ASIACRYPT
2010
Springer
15 years 1 months ago
The Round Complexity of Verifiable Secret Sharing: The Statistical Case
We consider the round complexity of a basic cryptographic task: verifiable secret sharing (VSS). This well-studied primitive provides a good "test case" for our understan...
Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan
« Prev « First page 2217 / 2458 Last » Next »