• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,318
Next 10 →

Economic analysis of cross section and panel data

by Jeffrey M. Wooldridge
"... ..."
Abstract - Cited by 3292 (18 self) - Add to MetaCart
Abstract not found

A survey of general-purpose computation on graphics hardware

by John D. Owens, David Luebke, Naga Govindaraju, Mark Harris, Jens Krüger, Aaron E. Lefohn, Tim Purcell , 2007
"... The rapid increase in the performance of graphics hardware, coupled with recent improvements in its programmability, have made graphics hardware acompelling platform for computationally demanding tasks in awide variety of application domains. In this report, we describe, summarize, and analyze the l ..."
Abstract - Cited by 545 (18 self) - Add to MetaCart
the main body of this report at two separate audiences. First, we describe the techniques used in mapping general-purpose computation to graphics hardware. We believe these techniques will be generally useful for researchers who plan to develop the next generation of GPGPU algorithms and techniques. Second

From Sparse Solutions of Systems of Equations to Sparse Modeling of Signals and Images

by Alfred M. Bruckstein, David L. Donoho, Michael Elad , 2007
"... A full-rank matrix A ∈ IR n×m with n < m generates an underdetermined system of linear equations Ax = b having infinitely many solutions. Suppose we seek the sparsest solution, i.e., the one with the fewest nonzero entries: can it ever be unique? If so, when? As optimization of sparsity is combin ..."
Abstract - Cited by 423 (37 self) - Add to MetaCart
A full-rank matrix A ∈ IR n×m with n < m generates an underdetermined system of linear equations Ax = b having infinitely many solutions. Suppose we seek the sparsest solution, i.e., the one with the fewest nonzero entries: can it ever be unique? If so, when? As optimization of sparsity

Open Access 3D DWT-DCT and Logistic MAP Based Robust Watermarking for Medical Volume Data

by Jingbing Li, Yaoli Liu, Jiling Zhong
"... Abstract: Applying digital watermarking technique for the security protection of medical information systems is a hotspot of research in recent years. In this paper, we present a robust watermarking algorithm for medical volume data using 3D DWT-DCT and Logistic Map. After applying Logistic Map to e ..."
Abstract - Add to MetaCart
Abstract: Applying digital watermarking technique for the security protection of medical information systems is a hotspot of research in recent years. In this paper, we present a robust watermarking algorithm for medical volume data using 3D DWT-DCT and Logistic Map. After applying Logistic Map

Exact Indexing of Dynamic Time Warping

by Eamonn Keogh , 2002
"... The problem of indexing time series has attracted much research interest in the database community. Most algorithms used to index time series utilize the Euclidean distance or some variation thereof. However is has been forcefully shown that the Euclidean distance is a very brittle distance me ..."
Abstract - Cited by 339 (33 self) - Add to MetaCart
The problem of indexing time series has attracted much research interest in the database community. Most algorithms used to index time series utilize the Euclidean distance or some variation thereof. However is has been forcefully shown that the Euclidean distance is a very brittle distance

A Comparison of DFT and DWT Based Similarity Search in Time-Series Databases

by Yi-leh Wu, Divyakant Agrawal, Amr El Abbadi - In Proceedings of the 9 th International Conference on Information and Knowledge Management , 2000
"... Similarity search in time-series databases has received significant attention lately. Popular techniques for efficient retrieval of time sequences in time-series databases has been to use Discrete Fourier Transform (DFT). Recently, the Discrete Wavelet Transform (DWT) has gained popular interest i ..."
Abstract - Cited by 56 (2 self) - Add to MetaCart
Similarity search in time-series databases has received significant attention lately. Popular techniques for efficient retrieval of time sequences in time-series databases has been to use Discrete Fourier Transform (DFT). Recently, the Discrete Wavelet Transform (DWT) has gained popular interest

A Robust Watermarking Approach using DCT-DWT

by Surya Pratap Singh, Paresh Rawat, Sudhir Agrawal
"... Abstract- This paper presents a robust watermarking technique for color and grayscale image. The proposed method involves many techniques to conform a secure and robust watermarking. In the proposed technique the watermark is embedded in 3 rd level of DWT (Discrete Wavelet Transform) and before embe ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Abstract- This paper presents a robust watermarking technique for color and grayscale image. The proposed method involves many techniques to conform a secure and robust watermarking. In the proposed technique the watermark is embedded in 3 rd level of DWT (Discrete Wavelet Transform) and before

A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression

by Xiangui Kang, Jiwu Huang, Yun Q. Shi, Yan Lin - IEEE TRANS. CIRCUITS SYST. VIDEO TECHNOL , 2003
"... Robustness is one of the crucial important issues in watermarking. Robustness against geometric distortion and JPEG compression at the same time with blind extraction remains especially challenging. In this paper, a blind discrete wavelet transform-discrete Fourier transform (DWT-DFT) composite ima ..."
Abstract - Cited by 44 (6 self) - Add to MetaCart
image watermarking algorithm that is robust against both affine transformation and JPEG compression is proposed. This algorithm improves the robustness via using new embedding strategy, watermark structure, 2-D interleaving, and synchronization technique. A spread-spectrum-based informative watermark

A Robust Medical Image Authentication Technique using QR Code and DWT

by Sirshendu Hore, Tanmay Bhattacharya, S. R. Bhadra Chaudhuri
"... Image authentication plays a vital role in safeguarding the originality as well as helps to retain the integrity of the data. It is also used as proof in case of content delivery. This paper proposes an efficient and effective medical image authentication technique by embedding information of a pati ..."
Abstract - Add to MetaCart
Image authentication plays a vital role in safeguarding the originality as well as helps to retain the integrity of the data. It is also used as proof in case of content delivery. This paper proposes an efficient and effective medical image authentication technique by embedding information of a

medical images based on

by Jiangtao Dong, Jingbing Li, Yucong Duan
"... robust watermarking algorithm for encrypted ..."
Abstract - Add to MetaCart
robust watermarking algorithm for encrypted
Next 10 →
Results 1 - 10 of 3,318
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University