ABSTRACT the pyramid. Recently, a number of promising quanMultiresolution imagedecompositions (e. g., wavelets), in conjunction with a variety of quantization schemes, have been sh...
Birsen Yazici, Mary L. Comer, Rangasami L. Kashyap...
This work presents a new approach to contour representation and coding. It consists of an improved fitting of high-degree (4th to 18th ) implicit polynomials (IPs) to the contour,...
Suppose a function of N real source variables XN 1 = (X1, X2, . . . , XN ) is desired at a destination constrained to receive a limited number of bits. If the result of evaluating...
We consider state estimation of a Markov stochastic process using an ad hoc wireless sensor network (WSN) based on noisy linear observations. Due to power and bandwidth constraint...
Eric J. Msechu, Alejandro Ribeiro, Stergios I. Rou...
Currently, most quantization based data hiding algorithms are built assuming specific distributions of attacks, such as additive white Gaussian noise (AWGN), uniform noise, and s...