• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,968
Next 10 →

Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding

by Brian Chen, Gregory W. Wornell - IEEE TRANS. ON INFORMATION THEORY , 1999
"... We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third, "composite" signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing information-embedding rate, mini ..."
Abstract - Cited by 496 (14 self) - Add to MetaCart
We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third, "composite" signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing information-embedding rate

On limits of wireless communications in a fading environment when using multiple antennas

by G. J. Foschini, M. J. Gans - Wireless Personal Communications , 1998
"... Abstract. This paper is motivated by the need for fundamental understanding of ultimate limits of bandwidth efficient delivery of higher bit-rates in digital wireless communications and to also begin to look into how these limits might be approached. We examine exploitation of multi-element array (M ..."
Abstract - Cited by 2426 (14 self) - Add to MetaCart
Abstract. This paper is motivated by the need for fundamental understanding of ultimate limits of bandwidth efficient delivery of higher bit-rates in digital wireless communications and to also begin to look into how these limits might be approached. We examine exploitation of multi-element array

Pyramid-Based Texture Analysis/Synthesis

by David J. Heeger, James R. Bergen , 1995
"... This paper describes a method for synthesizing images that match the texture appearanceof a given digitized sample. This synthesis is completely automatic and requires only the "target" texture as input. It allows generation of as much texture as desired so that any object can be covered. ..."
Abstract - Cited by 480 (0 self) - Add to MetaCart
. It can be used to produce solid textures for creating textured 3-d objects without the distortions inherent in texture mapping. It can also be used to synthesize texture mixtures, images that look a bit like each of several digitized samples. The approach is based on a model of human texture perception

Distributed Multiuser Power Control for Digital Subscriber Lines

by Wei Yu, George Ginis, John M. Cioffi , 2002
"... This paper considers the multiuser power control problem in a frequency-selective interference channel. The interference channel is modeled as a noncooperative game, and the existence and uniqueness of a Nash equilibrium are established for a two-player version of the game. An iterative water-fillin ..."
Abstract - Cited by 271 (23 self) - Add to MetaCart
allocation by offering an opportunity for loops to negotiate the best use of power and frequency with each other. When applied to the upstream power backoff problem in very-high bit-rate digital subscriber lines and the downstream spectral compatibility problem in asymmetric digital subscriber lines, the new

Analog-to-digital converter survey and analysis

by Robert H. Walden - IEEE Journal on Selected Areas in Communications , 1999
"... Abstract—Analog-to-digital converters (ADC’s) are ubiquitous, critical components of software radio and other signal processing systems. This paper surveys the state-of-the-art of ADC’s, including experimental converters and commercially available parts. The distribution of resolution versus samplin ..."
Abstract - Cited by 263 (0 self) - Add to MetaCart
Abstract—Analog-to-digital converters (ADC’s) are ubiquitous, critical components of software radio and other signal processing systems. This paper surveys the state-of-the-art of ADC’s, including experimental converters and commercially available parts. The distribution of resolution versus

MyLifeBits: Fulfilling the Memex Vision

by Jim Gemmell, Gordon Bell, Roger Lueder, Steven Drucker, Curtis Wong , 2002
"... MyLifeBits is a project to fulfill the Memex vision first posited by Vannevar Bush in 1945. It is a system for storing all of one's digital media, including documents, images, sounds, and videos. ..."
Abstract - Cited by 212 (3 self) - Add to MetaCart
MyLifeBits is a project to fulfill the Memex vision first posited by Vannevar Bush in 1945. It is a system for storing all of one's digital media, including documents, images, sounds, and videos.

Bits

by Michael Davey
"... and pieces on amputations and avulsions! QUESTION 1 Which of the following are true regarding tooth avulsions? a. Primary teeth should not be replaced after avulsion. b. The majority of patients presenting to the emergency department with an avulsed tooth will lose that tooth. c. Milk will preserve ..."
Abstract - Add to MetaCart
the periodontal ligament for 4e8 h. d. The root of an avulsed tooth should not be wiped clean of gross contaminants because this may damage the periodontal ligament. QUESTION 2 Which of the following are true regarding amputations of digits? a. Finger tip amputations with a wound area less than 10 mm2 typically

A Two-Dimensional Digital Watermark

by Tirkel Van Schyndel , 1995
"... This paper discusses the feasibility of coding a robust, undetectable, digital water mark on a standard 512*512 intensity image with an 8 bit gray scale. The watermark is capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation. Th ..."
Abstract - Cited by 206 (1 self) - Add to MetaCart
This paper discusses the feasibility of coding a robust, undetectable, digital water mark on a standard 512*512 intensity image with an 8 bit gray scale. The watermark is capable of carrying such information as authentication or authorisation codes, or a legend essential for image interpretation

Digital Signcryption or How to Achieve Cost(Signature

by Yuliang Zheng , 1997
"... Abstract. Secure and authenticated message delivery/storage is one of the major aims of computer and communication security research. The current standard method to achieve this aim is “(digital) signature followed by encryption”. In this paper, we address a question on the cost of secure and authen ..."
Abstract - Cited by 205 (20 self) - Add to MetaCart
Abstract. Secure and authenticated message delivery/storage is one of the major aims of computer and communication security research. The current standard method to achieve this aim is “(digital) signature followed by encryption”. In this paper, we address a question on the cost of secure

How to Sign Digital Streams

by Rosario Gennaro, Pankaj Rohatgi , 1997
"... We present a new efficient paradigm for signing digital streams. The problem of signing digital streams to prove their authenticity is substantially different from the problem of signing regular messages. Traditional signature schemes are message oriented and require the receiver to process the enti ..."
Abstract - Cited by 171 (0 self) - Add to MetaCart
We present a new efficient paradigm for signing digital streams. The problem of signing digital streams to prove their authenticity is substantially different from the problem of signing regular messages. Traditional signature schemes are message oriented and require the receiver to process
Next 10 →
Results 1 - 10 of 5,968
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University