Sciweavers

1259 search results - page 202 / 252
» In search of the memoryless property
Sort
View
TIP
2002
102views more  TIP 2002»
13 years 7 months ago
Hierarchical watermarking for secure image authentication with localization
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to impr...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
PRL
2008
122views more  PRL 2008»
13 years 7 months ago
Constraints for closest point finding
The traditional closest point criterion has been widely used for 3D free form shape matching, object recognition, internet search, computer graphics and medical imaging. However, ...
Yonghuai Liu
CIKM
2010
Springer
13 years 6 months ago
Ranking under temporal constraints
This paper introduces the notion of temporally constrained ranked retrieval, which, given a query and a time constraint, produces the best possible ranked list within the specifi...
Lidan Wang, Donald Metzler, Jimmy Lin
ACTA
2008
88views more  ACTA 2008»
13 years 6 months ago
Weighted height of random trees
We consider a model of random trees similar to the split trees of Devroye [30] in which a set of items is recursively partitioned. Our model allows for more flexibility in the cho...
Nicolas Broutin, Luc Devroye, Erin McLeish
ICST
2010
IEEE
13 years 6 months ago
Longer is Better: On the Role of Test Sequence Length in Software Testing
In the presence of an internal state, often it is required a sequence of function calls to test software. In fact, to cover a particular branch of the code, a sequence of previous...
Andrea Arcuri