Results 1 - 10
of
5,968
Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding
- IEEE TRANS. ON INFORMATION THEORY
, 1999
"... We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third, "composite" signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing information-embedding rate, mini ..."
Abstract
-
Cited by 496 (14 self)
- Add to MetaCart
We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third, "composite" signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing information-embedding rate
On limits of wireless communications in a fading environment when using multiple antennas
- Wireless Personal Communications
, 1998
"... Abstract. This paper is motivated by the need for fundamental understanding of ultimate limits of bandwidth efficient delivery of higher bit-rates in digital wireless communications and to also begin to look into how these limits might be approached. We examine exploitation of multi-element array (M ..."
Abstract
-
Cited by 2426 (14 self)
- Add to MetaCart
Abstract. This paper is motivated by the need for fundamental understanding of ultimate limits of bandwidth efficient delivery of higher bit-rates in digital wireless communications and to also begin to look into how these limits might be approached. We examine exploitation of multi-element array
Pyramid-Based Texture Analysis/Synthesis
, 1995
"... This paper describes a method for synthesizing images that match the texture appearanceof a given digitized sample. This synthesis is completely automatic and requires only the "target" texture as input. It allows generation of as much texture as desired so that any object can be covered. ..."
Abstract
-
Cited by 480 (0 self)
- Add to MetaCart
. It can be used to produce solid textures for creating textured 3-d objects without the distortions inherent in texture mapping. It can also be used to synthesize texture mixtures, images that look a bit like each of several digitized samples. The approach is based on a model of human texture perception
Distributed Multiuser Power Control for Digital Subscriber Lines
, 2002
"... This paper considers the multiuser power control problem in a frequency-selective interference channel. The interference channel is modeled as a noncooperative game, and the existence and uniqueness of a Nash equilibrium are established for a two-player version of the game. An iterative water-fillin ..."
Abstract
-
Cited by 271 (23 self)
- Add to MetaCart
allocation by offering an opportunity for loops to negotiate the best use of power and frequency with each other. When applied to the upstream power backoff problem in very-high bit-rate digital subscriber lines and the downstream spectral compatibility problem in asymmetric digital subscriber lines, the new
Analog-to-digital converter survey and analysis
- IEEE Journal on Selected Areas in Communications
, 1999
"... Abstract—Analog-to-digital converters (ADC’s) are ubiquitous, critical components of software radio and other signal processing systems. This paper surveys the state-of-the-art of ADC’s, including experimental converters and commercially available parts. The distribution of resolution versus samplin ..."
Abstract
-
Cited by 263 (0 self)
- Add to MetaCart
Abstract—Analog-to-digital converters (ADC’s) are ubiquitous, critical components of software radio and other signal processing systems. This paper surveys the state-of-the-art of ADC’s, including experimental converters and commercially available parts. The distribution of resolution versus
MyLifeBits: Fulfilling the Memex Vision
, 2002
"... MyLifeBits is a project to fulfill the Memex vision first posited by Vannevar Bush in 1945. It is a system for storing all of one's digital media, including documents, images, sounds, and videos. ..."
Abstract
-
Cited by 212 (3 self)
- Add to MetaCart
MyLifeBits is a project to fulfill the Memex vision first posited by Vannevar Bush in 1945. It is a system for storing all of one's digital media, including documents, images, sounds, and videos.
Bits
"... and pieces on amputations and avulsions! QUESTION 1 Which of the following are true regarding tooth avulsions? a. Primary teeth should not be replaced after avulsion. b. The majority of patients presenting to the emergency department with an avulsed tooth will lose that tooth. c. Milk will preserve ..."
Abstract
- Add to MetaCart
the periodontal ligament for 4e8 h. d. The root of an avulsed tooth should not be wiped clean of gross contaminants because this may damage the periodontal ligament. QUESTION 2 Which of the following are true regarding amputations of digits? a. Finger tip amputations with a wound area less than 10 mm2 typically
A Two-Dimensional Digital Watermark
, 1995
"... This paper discusses the feasibility of coding a robust, undetectable, digital water mark on a standard 512*512 intensity image with an 8 bit gray scale. The watermark is capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation. Th ..."
Abstract
-
Cited by 206 (1 self)
- Add to MetaCart
This paper discusses the feasibility of coding a robust, undetectable, digital water mark on a standard 512*512 intensity image with an 8 bit gray scale. The watermark is capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation
Digital Signcryption or How to Achieve Cost(Signature
, 1997
"... Abstract. Secure and authenticated message delivery/storage is one of the major aims of computer and communication security research. The current standard method to achieve this aim is “(digital) signature followed by encryption”. In this paper, we address a question on the cost of secure and authen ..."
Abstract
-
Cited by 205 (20 self)
- Add to MetaCart
Abstract. Secure and authenticated message delivery/storage is one of the major aims of computer and communication security research. The current standard method to achieve this aim is “(digital) signature followed by encryption”. In this paper, we address a question on the cost of secure
How to Sign Digital Streams
, 1997
"... We present a new efficient paradigm for signing digital streams. The problem of signing digital streams to prove their authenticity is substantially different from the problem of signing regular messages. Traditional signature schemes are message oriented and require the receiver to process the enti ..."
Abstract
-
Cited by 171 (0 self)
- Add to MetaCart
We present a new efficient paradigm for signing digital streams. The problem of signing digital streams to prove their authenticity is substantially different from the problem of signing regular messages. Traditional signature schemes are message oriented and require the receiver to process
Results 1 - 10
of
5,968