Sciweavers

603 search results - page 55 / 121
» Embedded Formulas Extraction
Sort
View
TIFS
2008
152views more  TIFS 2008»
13 years 8 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
DATE
2002
IEEE
79views Hardware» more  DATE 2002»
14 years 1 months ago
Formulation of Low-Order Dominant Poles for Y-Matrix of Interconnects
This paper presents an efficient approach to compute the dominant poles for the reduced-order admittance (Y parameter) matrix of lossy interconnects. Using the global approximati...
Qinwei Xu, Pinaki Mazumder
ICRA
2000
IEEE
111views Robotics» more  ICRA 2000»
14 years 1 months ago
Interpretation of Sewer Circular Structures
A practical algorithm for 3-D interpretation of images taken in a sewer by a robot-inspector is presented. Modern sewers made of concrete present regular circular structures origi...
Marina Kolesnik, Gregory Baratoff
ICIP
2007
IEEE
14 years 10 months ago
A Composite Approach for Blind Grayscale Logo Watermarking
This paper presents a composite blind digital watermarking technique, CompMark, to hide a visually meaningful grayscale logo in a host image. The multi-resolution fusion principle...
Elliot First, Xiaojun Qi
KDD
2000
ACM
162views Data Mining» more  KDD 2000»
14 years 8 days ago
Data Mining from Functional Brain Images
Recent advances in functional brain imaging enable identication of active areas of a brain performing a certain function. Induction of logical formulas describing relations betwee...
Mitsuru Kakimoto, Chie Morita, Yoshiaki Kikuchi, H...