Sciweavers

16843 search results - page 142 / 3369
» On Generalized Authorization Problems
Sort
View
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
14 years 23 days ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
IRI
2009
IEEE
14 years 3 months ago
Towards a General Entity Representation Model
In recent years, there is an increasing interest in the Semantic Web and the relevant technologies, which can have a significant impact in the context of information and knowledge...
Barbara Bazzanella, Themis Palpanas, Heiko Stoerme...
ICCVW
1999
Springer
14 years 18 days ago
Generalized Voxel Coloring
Image-based reconstruction from randomly scattered views is a challenging problem. We present a new algorithm that extends Seitz and Dyer’s Voxel Coloring algorithm. Unlike their...
W. Bruce Culbertson, Thomas Malzbender, Gregory G....
TIT
2011
119views more  TIT 2011»
13 years 3 months ago
Redundancy-Related Bounds for Generalized Huffman Codes
— This paper presents new lower and upper bounds for the compression rate of binary prefix codes optimized over memoryless sources according to various nonlinear codeword length...
Michael B. Baer
IJCNN
2006
IEEE
14 years 2 months ago
Patterns, Hypergraphs and Embodied General Intelligence
—It is proposed that the creation of Artificial General Intelligence (AGI) at the human level and ultimately beyond is a problem addressable via integrating computer science algo...
Ben Goertzel