Sciweavers

2659 search results - page 120 / 532
» Do we mean the same
Sort
View
158
Voted
JEI
2002
152views more  JEI 2002»
15 years 4 months ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
114
Voted
ICML
2006
IEEE
16 years 5 months ago
Inference with the Universum
In this paper we study a new framework introduced by Vapnik (1998) and Vapnik (2006) that is an alternative capacity concept to the large margin approach. In the particular case o...
Fabian H. Sinz, Jason Weston, Léon Bottou, ...
ICIP
2008
IEEE
16 years 6 months ago
Supervised methods for perfect segmentation in medical images
We pose the problem of perfect segmentation for regions with ambiguous boundaries. We design machine learning classifiers to identify boundaries and build these into an interactiv...
Tony Shepherd, Daniel C. Alexander
124
Voted
DAC
2001
ACM
16 years 5 months ago
A2BC: Adaptive Address Bus Coding for Low Power Deep Sub-Micron Designs
Due to larger buses (length, width) and deep sub-micron effects where coupling capacitances between bus lines are in the same order of magnitude as base capacitances, power consum...
Haris Lekatsas, Jörg Henkel
155
Voted
CVPR
2010
IEEE
16 years 23 days ago
Super-Resolution of Range Data in Dynamic Environments Using a Gaussian Framework
We present a flexible method for fusing information from optical and range sensors based on an accelerated highdimensional filtering approach. Our system takes as input a sequen...
Jennifer Dolson, Jongmin Baek, Christian Plagemann...