Sciweavers

278 search results - page 24 / 56
» toms 2008
Sort
View
TIFS
2008
194views more  TIFS 2008»
13 years 7 months ago
Detection of Double-Compression in JPEG Images for Applications in Steganography
This paper presents a method for detection of double JPEG compression and a maximum likelihood estimator of the primary quality factor. These methods are essential for construction...
Tomás Pevný, Jessica J. Fridrich
AGILEDC
2008
IEEE
14 years 2 months ago
The Intermediate Customer Anti-Pattern
Scrum focuses on collaboration with the customer, but what if your customer is actually a provider for yet another customer? Then who is your real customer? What if these two poss...
Tom Perry
CDC
2008
IEEE
111views Control Systems» more  CDC 2008»
14 years 2 months ago
Estimating disturbances and model uncertainty in model validation for robust control
— Deterministic approaches to model validation for robust control are investigated. In common deterministic model validation approaches, a trade-off between disturbances and mode...
Tom Oomen, Okko Bosgra
AAAI
2008
13 years 10 months ago
Lexical and Grammatical Inference
Children are facile at both discovering word boundaries and using those words to build higher-level structures in tandem. Current research treats lexical acquisition and grammar i...
Tom Armstrong, Tim Oates
ICIP
2008
IEEE
14 years 2 months ago
Blind restoration of blurred photographs via AR modelling and MCMC
We propose a new image and blur prior model, based on nonstationary autoregressive (AR) models, and use these to blindly deconvolve blurred photographic images, using the Gibbs sa...
Tom E. Bishop, Rafael Molina, James R. Hopgood