Sciweavers

555 search results - page 77 / 111
» Polar codes are optimal for lossy source coding
Sort
View
KDD
2009
ACM
229views Data Mining» more  KDD 2009»
14 years 8 months ago
An association analysis approach to biclustering
The discovery of biclusters, which denote groups of items that show coherent values across a subset of all the transactions in a data set, is an important type of analysis perform...
Gaurav Pandey, Gowtham Atluri, Michael Steinbach, ...
ICIP
2002
IEEE
14 years 9 months ago
A no-reference perceptual blur metric
In this paper, we present a no-reference blur metric for images and video. The blur metric is based on the analysis of the spread of the edges in an image. Its perceptual signific...
Frédéric Dufaux, Pina Marziliano, St...
DCC
2007
IEEE
14 years 7 months ago
Spectral Predictors
Many scientific, imaging, and geospatial applications produce large high-precision scalar fields sampled on a regular grid. Lossless compression of such data is commonly done usin...
Lorenzo Ibarria, Peter Lindstrom, Jarek Rossignac
WSE
2006
IEEE
14 years 1 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...
CGO
2005
IEEE
14 years 1 months ago
Automatic Generation of High-Performance Trace Compressors
Program execution traces are frequently used in industry and academia. Yet, most trace-compression algorithms have to be re-implemented every time the trace format is changed, whi...
Martin Burtscher, Nana B. Sam