Sciweavers

385 search results - page 72 / 77
» Code Compression Using Variable-to-fixed Coding Based on Ari...
Sort
View
ICIP
2008
IEEE
14 years 9 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
IJIT
2004
13 years 8 months ago
A Lossless Watermarking Based Authentication System For Medical Images
In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to frag...
Samia Boucherkha, Mohamed Benmohamed
INFOCOM
2003
IEEE
14 years 23 days ago
A Distributed and Adaptive Signal Processing Approach to Reducing Energy Consumption in Sensor Networks
— We propose a novel approach to reducing energy consumption in sensor networks using a distributed adaptive signal processing framework and efficient algorithm 1 . While the to...
Jim Chou, Dragan Petrovic, Kannan Ramchandran
ADHOC
2004
127views more  ADHOC 2004»
13 years 7 months ago
A distributed and adaptive signal processing approach to exploiting correlation in sensor networks
We propose a novel approach to reducing energy consumption in sensor networks using a distributed adaptive signal processing framework and efficient algorithm 1 . While the topic o...
Jim Chou, Dragan Petrovic, Kannan Ramchandran
CAL
2007
13 years 7 months ago
Low-Cost Microarchitectural Support for Improved Floating-Point Accuracy
Abstract—Some processors designed for consumer applications, such as Graphics Processing Units (GPUs) and the CELL processor, promise outstanding floating-point performance for ...
William R. Dieter, A. Kaveti, Henry G. Dietz