Sciweavers

112 search results - page 18 / 23
» A novel memetic algorithm for constrained optimization
Sort
View
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
14 years 1 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
IPMI
2009
Springer
14 years 7 months ago
Cortical Correspondence with Probabilistic Fiber Connectivity
Abstract. This paper presents a novel method of optimizing pointbased correspondence among populations of human cortical surfaces by combining structural cues with probabilistic co...
Ipek Oguz, Marc Niethammer, Joshua E. Cates, Ross ...
TCSV
2002
161views more  TCSV 2002»
13 years 6 months ago
Blocking artifact detection and reduction in compressed data
A novel frequency-domain technique for image blocking artifact detection and reduction is presented in this paper. The algorithm first detects the regions of the image which presen...
George A. Triantafyllidis, Dimitrios Tzovaras, Mic...
ASAP
2007
IEEE
95views Hardware» more  ASAP 2007»
14 years 1 months ago
Performance Evaluation of Probe-Send Fault-tolerant Network-on-chip Router
With increasing reliability concerns for current and next generation VLSI technologies, fault-tolerance is fast becoming an integral part of system-on-chip and multicore architect...
Sumit D. Mediratta, Jeffrey T. Draper
ICIP
2009
IEEE
13 years 4 months ago
New image processing challenges for jointly designed electro-optical imaging systems
Still-image processing algorithms are tailored to and depend crucially upon the properties of the class of images to which they are applied, for instance natural images in consumer...
M. Dirk Robinson, David G. Stork