Sciweavers

1542 search results - page 195 / 309
» A compressive beamforming method
Sort
View
FSE
2001
Springer
109views Cryptology» more  FSE 2001»
15 years 9 months ago
Bias in the LEVIATHAN Stream Cipher
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the ci...
Paul Crowley, Stefan Lucks
PCM
2001
Springer
147views Multimedia» more  PCM 2001»
15 years 9 months ago
Adaptive Video Watermarking Scheme
In this paper, a new adaptive watermarking scheme for uncompressed and compressed video is presented. The proposed method embeds the watermark in DC components by quantizing DC coe...
Xiangwei Kong, Yu Liu, Huajian Liu
NIPS
2003
15 years 6 months ago
The IM Algorithm: A Variational Approach to Information Maximization
The maximisation of information transmission over noisy channels is a common, albeit generally computationally difficult problem. We approach the difficulty of computing the mutua...
David Barber, Felix V. Agakov
COMGEO
2006
ACM
15 years 4 months ago
Preferred directions for resolving the non-uniqueness of Delaunay triangulations
: This note proposes a simple rule to determine a unique triangulation among all Delaunay triangulations of a planar point set, based on two preferred directions. We show that the ...
Christopher Dyken, Michael S. Floater
CJ
1998
118views more  CJ 1998»
15 years 4 months ago
Least-Squares Structuring, Clustering and Data Processing Issues
Approximation structuring clustering is an extension of what is usually called square-error clustering" onto various cluster structures and data formats. It appears to be not...
Boris Mirkin