Sciweavers

297 search results - page 46 / 60
» Module embedding
Sort
View
ICIP
2009
IEEE
14 years 10 months ago
Security Evaluation Of Informed Watermarking Schemes
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
KDD
2001
ACM
166views Data Mining» more  KDD 2001»
14 years 9 months ago
Generalized clustering, supervised learning, and data assignment
Clustering algorithms have become increasingly important in handling and analyzing data. Considerable work has been done in devising effective but increasingly specific clustering...
Annaka Kalton, Pat Langley, Kiri Wagstaff, Jungsoo...
DCC
2008
IEEE
14 years 8 months ago
Noise-Shaped Predictive Coding for Multiple Descriptions of a Colored Gaussian Source
It was recently shown that the symmetric multiple-description (MD) quadratic rate-distortion function for memoryless Gaussian sources and two descriptions can be achieved by dithe...
Jan Østergaard, Ram Zamir, Yuval Kochman
PERCOM
2009
ACM
14 years 3 months ago
A Dynamic Platform for Runtime Adaptation
—We present a middleware platform for assembling pervasive applications that demand fault-tolerance and adaptivity in distributed, dynamic environments. Unlike typical adaptive m...
Hubert Pham, Justin Mazzola Paluska, Umar Saif, Ch...
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
14 years 3 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran