Sciweavers

8785 search results - page 1560 / 1757
» Management of data with uncertainties
Sort
View
IH
1998
Springer
14 years 3 months ago
Secure Copyright Protection Techniques for Digital Images
This paper2 presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images ...
Alexander Herrigel, Joseph Ó Ruanaidh, Holg...
IH
1998
Springer
14 years 3 months ago
Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks
Theoretical modeling of watermarks allow prediction of the detector reliability and facilitates the development of more reliable systems. In particular, mathematical evaluation is ...
Jean-Paul M. G. Linnartz, Ton Kalker, Geert Depove...
KES
1998
Springer
14 years 3 months ago
An acquisition of the relation between vision and action using self-organizing map and reinforcement learning
An agent must acquire internal representation appropriate for its task, environment, sensors. As a learning algorithm, reinforcement learning is often utilized to acquire the rela...
Kazunori Terada, Hideaki Takeda, Toyoaki Nishida
ICC
1997
IEEE
110views Communications» more  ICC 1997»
14 years 3 months ago
Optimizing Resource Utilization in Wireless Multimedia Networks
The task of supporting integrated multi-rate multimedia traffic in a bandwidth poor wireless environment poses a unique and challenging problem for network managers. In this paper...
Paramvir Bahl, Imrich Chlamtac, András Fara...
LCTRTS
1998
Springer
14 years 3 months ago
Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques
Abstract. Previously published methods for estimation of the worstcase execution time on contemporary processors with complex pipelines and multi-level memory hierarchies result in...
Thomas Lundqvist, Per Stenström
« Prev « First page 1560 / 1757 Last » Next »