Sciweavers

104 search results - page 19 / 21
» Compression of Unicode Files
Sort
View
ICIP
2007
IEEE
14 years 11 months ago
Image Authentication Based on Distributed Source Coding
Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original imag...
Yao-Chung Lin, David P. Varodayan, Bernd Girod
ACMSE
2005
ACM
14 years 3 months ago
On developing a simple in-house digital library archive
Digital libraries (DLs) have become a major focus of information technology resources for organizations from academia, to the US Department of Defense to the archeological efforts...
Eric L. Brown, Luis G. Velazco, G. Kirksey, S. Ram...
MM
2005
ACM
178views Multimedia» more  MM 2005»
14 years 3 months ago
Attention region selection with information from professional digital camera
The attentive region extraction is a challenging issue for semantic interpretation of image and video content. The successful attentive region extraction greatly facilitates image...
Song Liu, Liang-Tien Chia, Deepu Rajan
MOBIDE
1999
ACM
14 years 2 months ago
Accelerating Telnet Performance in Wireless Networks
This paper describes the design of a system that significantly improves the performance of telnet data delivery for 3270 and 5250 emulation so that access to legacy applications v...
Barron C. Housel, Ian Shields
SPIRE
1998
Springer
14 years 2 months ago
An Experiment Stemming Non-Traditional Text
Stemming is a technique which aims to extract common suffixes of words. Thus, words which are literally differhave a common stem, may be abstracted by their common stem. The under...
Mario A. Nascimento, Adriano C. R. da Cunha