Sciweavers

944 search results - page 180 / 189
» An evaluation of image based steganography methods
Sort
View
ICIP
2002
IEEE
14 years 1 months ago
Wavelet coding of volumetric medical datasets
—Several techniques based on the three–dimensional (3-D) discrete cosine transform (DCT) have been proposed for volumetric data coding. These techniques fail to provide lossles...
Adrian Munteanu, Peter Schelkens, Jan Cornelis
DAWAK
2001
Springer
14 years 27 days ago
Adaptable Similarity Search Using Vector Quantization
Adaptable similarity queries based on quadratic form distance functions are widely popular in data mining applications, particularly for domains such as multimedia, CAD, molecular ...
Christian Böhm, Hans-Peter Kriegel, Thomas Se...
DASFAA
2009
IEEE
122views Database» more  DASFAA 2009»
14 years 9 days ago
Optimization on Data Object Compression and Replication in Wireless Multimedia Sensor Networks
Wireless Multimedia Sensor Networks (WMSNs) have brought unprecedented potentials for applications requiring ubiquitous access to multimedia contents such as still images. However,...
MingJian Tang, Jinli Cao, Xiaohua Jia, Ke-Yan Liu
APGV
2008
ACM
164views Visualization» more  APGV 2008»
13 years 10 months ago
Quantifying usability in secure graphics: assessing the user costs of protecting 3D content
There is an increasing need for methods for secure dissemination of interactive 3D graphics content, providing protection for valuable 3D models while still allowing them to be wi...
Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Tho...
PDPTA
2000
13 years 9 months ago
Performance Analysis of a Cluster File System
Design of cluster file system is very important for building a general-purpose cluster with commodity components. To provide scalable high I/O performance needed in the scientific...
Cong Du, Zhiwei Xu