Sciweavers

104 search results - page 16 / 21
» Compression of Unicode Files
Sort
View
ICIP
2005
IEEE
14 years 11 months ago
Watermarking JBIG2 text region for image authentication
An authentication watermarking technique (AWT) inserts hidden data into an image in order to detect any accidental or malicious alteration to the image. AWT usually computes, usin...
Sergio Vicente Denser Pamboukian, Hae Yong Kim, Ri...
SSDBM
1998
IEEE
107views Database» more  SSDBM 1998»
14 years 2 months ago
Discrete Object Detection and Motion Registration Based on a Data Management Approach
When scientific data sets can be interpreted visually they are typically managed as pictures and consequently stored as large collections of bitmaps. Valuable information containe...
Hans Hinterberger, Bettina Bauer-Messmer
CASES
2004
ACM
14 years 3 months ago
A hamming distance based VLIW/EPIC code compression technique
This paper presents and reports on a VLIW code compression technique based on vector Hamming distances [19]. It investigates the appropriate selection of dictionary vectors such t...
Montserrat Ros, Peter Sutton
VLDB
2004
ACM
92views Database» more  VLDB 2004»
14 years 3 months ago
Write-Optimized B-Trees
Large writes are beneficial both on individual disks and on disk arrays, e.g., RAID-5. The presented design enables large writes of internal B-tree nodes and leaves. It supports b...
Goetz Graefe
SPIRE
2009
Springer
14 years 4 months ago
k2-Trees for Compact Web Graph Representation
The directed graph representation of the World Wide Web has been extensively used to analyze the Web structure, behavior and evolution. However, those graphs are huge and do not ï...
Nieves R. Brisaboa, Susana Ladra, Gonzalo Navarro