Sciweavers

1147 search results - page 132 / 230
» Transformation of Access Rights
Sort
View
PRL
2007
107views more  PRL 2007»
13 years 8 months ago
Robust SS watermarking with improved capacity
Robustness is a key attribute of spread spectrum (SS) watermarking scheme. It is significantly deteriorated if one tries to achieve high embedding rate keeping other parameters u...
Santi P. Maity, Malay K. Kundu, Tirtha S. Das
PRL
2007
101views more  PRL 2007»
13 years 8 months ago
Accuracy versus speed in context-based object detection
The visual detection and recognition of objects is facilitated by context. This paper studies two types of learning methods for realizing context-based object detection in paintin...
Niek Bergboer, Eric O. Postma, H. Jaap van den Her...
PRL
2007
131views more  PRL 2007»
13 years 8 months ago
A new look at discriminative training for hidden Markov models
ct 7 Discriminative training for hidden Markov models (HMMs) has been a central theme in speech recognition research for many years. 8 One most popular technique is minimum classi...
Xiaodong He, Li Deng
RSA
2008
81views more  RSA 2008»
13 years 8 months ago
Analyzing linear mergers
Mergers are functions that transform k (possibly dependent) random sources into a single random source, in a way that ensures that if one of the input sources has minentropy rate ...
Zeev Dvir, Ran Raz
BMVC
2010
13 years 7 months ago
Three-step image rectification
Image stereo-rectification is the process by which two images of the same solid scene undergo homographic transforms, so that their corresponding epipolar lines coincide and becom...
Pascal Monasse, Jean-Michel Morel, Zhongwei Tang