Results 1 - 10
of
3,318
A survey of general-purpose computation on graphics hardware
, 2007
"... The rapid increase in the performance of graphics hardware, coupled with recent improvements in its programmability, have made graphics hardware acompelling platform for computationally demanding tasks in awide variety of application domains. In this report, we describe, summarize, and analyze the l ..."
Abstract
-
Cited by 545 (18 self)
- Add to MetaCart
the main body of this report at two separate audiences. First, we describe the techniques used in mapping general-purpose computation to graphics hardware. We believe these techniques will be generally useful for researchers who plan to develop the next generation of GPGPU algorithms and techniques. Second
From Sparse Solutions of Systems of Equations to Sparse Modeling of Signals and Images
, 2007
"... A full-rank matrix A ∈ IR n×m with n < m generates an underdetermined system of linear equations Ax = b having infinitely many solutions. Suppose we seek the sparsest solution, i.e., the one with the fewest nonzero entries: can it ever be unique? If so, when? As optimization of sparsity is combin ..."
Abstract
-
Cited by 423 (37 self)
- Add to MetaCart
A full-rank matrix A ∈ IR n×m with n < m generates an underdetermined system of linear equations Ax = b having infinitely many solutions. Suppose we seek the sparsest solution, i.e., the one with the fewest nonzero entries: can it ever be unique? If so, when? As optimization of sparsity
Open Access 3D DWT-DCT and Logistic MAP Based Robust Watermarking for Medical Volume Data
"... Abstract: Applying digital watermarking technique for the security protection of medical information systems is a hotspot of research in recent years. In this paper, we present a robust watermarking algorithm for medical volume data using 3D DWT-DCT and Logistic Map. After applying Logistic Map to e ..."
Abstract
- Add to MetaCart
Abstract: Applying digital watermarking technique for the security protection of medical information systems is a hotspot of research in recent years. In this paper, we present a robust watermarking algorithm for medical volume data using 3D DWT-DCT and Logistic Map. After applying Logistic Map
Exact Indexing of Dynamic Time Warping
, 2002
"... The problem of indexing time series has attracted much research interest in the database community. Most algorithms used to index time series utilize the Euclidean distance or some variation thereof. However is has been forcefully shown that the Euclidean distance is a very brittle distance me ..."
Abstract
-
Cited by 339 (33 self)
- Add to MetaCart
The problem of indexing time series has attracted much research interest in the database community. Most algorithms used to index time series utilize the Euclidean distance or some variation thereof. However is has been forcefully shown that the Euclidean distance is a very brittle distance
A Comparison of DFT and DWT Based Similarity Search in Time-Series Databases
- In Proceedings of the 9 th International Conference on Information and Knowledge Management
, 2000
"... Similarity search in time-series databases has received significant attention lately. Popular techniques for efficient retrieval of time sequences in time-series databases has been to use Discrete Fourier Transform (DFT). Recently, the Discrete Wavelet Transform (DWT) has gained popular interest i ..."
Abstract
-
Cited by 56 (2 self)
- Add to MetaCart
Similarity search in time-series databases has received significant attention lately. Popular techniques for efficient retrieval of time sequences in time-series databases has been to use Discrete Fourier Transform (DFT). Recently, the Discrete Wavelet Transform (DWT) has gained popular interest
A Robust Watermarking Approach using DCT-DWT
"... Abstract- This paper presents a robust watermarking technique for color and grayscale image. The proposed method involves many techniques to conform a secure and robust watermarking. In the proposed technique the watermark is embedded in 3 rd level of DWT (Discrete Wavelet Transform) and before embe ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Abstract- This paper presents a robust watermarking technique for color and grayscale image. The proposed method involves many techniques to conform a secure and robust watermarking. In the proposed technique the watermark is embedded in 3 rd level of DWT (Discrete Wavelet Transform) and before
A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression
- IEEE TRANS. CIRCUITS SYST. VIDEO TECHNOL
, 2003
"... Robustness is one of the crucial important issues in watermarking. Robustness against geometric distortion and JPEG compression at the same time with blind extraction remains especially challenging. In this paper, a blind discrete wavelet transform-discrete Fourier transform (DWT-DFT) composite ima ..."
Abstract
-
Cited by 44 (6 self)
- Add to MetaCart
image watermarking algorithm that is robust against both affine transformation and JPEG compression is proposed. This algorithm improves the robustness via using new embedding strategy, watermark structure, 2-D interleaving, and synchronization technique. A spread-spectrum-based informative watermark
A Robust Medical Image Authentication Technique using QR Code and DWT
"... Image authentication plays a vital role in safeguarding the originality as well as helps to retain the integrity of the data. It is also used as proof in case of content delivery. This paper proposes an efficient and effective medical image authentication technique by embedding information of a pati ..."
Abstract
- Add to MetaCart
Image authentication plays a vital role in safeguarding the originality as well as helps to retain the integrity of the data. It is also used as proof in case of content delivery. This paper proposes an efficient and effective medical image authentication technique by embedding information of a
Results 1 - 10
of
3,318