• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 5,968
Next 10 →

The JPEG2000 Still Image Coding System: an Overview

by Charilaos Christopoulos, Athanassios Skodras, Touradj Ebrahimi , 2000
"... With the increasing use of multimedia technologies, image compression requires higher performance as well as new features. To address this need in the specific area of still image encoding, a new standard is currently being developed, the JPEC2000. It is not only intended to provide rate-distortion ..."
Abstract - Cited by 259 (2 self) - Add to MetaCart
by pixel accuracy and by resolution, robustness to the presence of bit-errors and region-of-interest coding, are some representative features. It is interesting to note that JPEG2000 is being designed to address the requirements of a diversity of applications, e.g. Internet, color facsimile, printing

The Elliptic Curve Digital Signature Algorithm (ECDSA)

by Don Johnson, Alfred Menezes , 1999
"... The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI standard, and was accepted in 2000 as IEEE and NIST standards. It was also accepted in 1998 as an ISO standard, and is under consideratio ..."
Abstract - Cited by 183 (5 self) - Add to MetaCart
The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI standard, and was accepted in 2000 as IEEE and NIST standards. It was also accepted in 1998 as an ISO standard, and is under

Architectural Power Analysis: The Dual Bit Type Method

by Paul E. Landman, Jan M. Rabaey , 1995
"... This paper describes a novel strategy for generating accurate black-box models of datapath power consumption at the architecture level. This is achieved by recognizing that power consumption in digital circuits is affected by activity, as well as physical capacitance. Since existing strategies chara ..."
Abstract - Cited by 141 (6 self) - Add to MetaCart
This paper describes a novel strategy for generating accurate black-box models of datapath power consumption at the architecture level. This is achieved by recognizing that power consumption in digital circuits is affected by activity, as well as physical capacitance. Since existing strategies

Perceptual Coding of Digital Audio

by Ted Painter, Andreas Spanias - Proceedings of the IEEE , 2000
"... During the last decade, CD-quality digital audio has essentially replaced analog audio. Emerging digital audio applications for network, wireless, and multimedia computing systems face a series of constraints such as reduced channel bandwidth, limited storage capacity, and low cost. These new applic ..."
Abstract - Cited by 158 (3 self) - Add to MetaCart
applications have created a demand for high-quality digital audio delivery at low bit rates. In response to this need, considerable research has been devoted to the development of algorithms for perceptually transparent coding of high-fidelity (CD-quality) digital audio. As a result, many algorithms have been

Digital Preservation Bits

by Curate Camp , 2014
"... Visit us at: digitalpreservation.gov/ Talk to us on our blog: ..."
Abstract - Add to MetaCart
Visit us at: digitalpreservation.gov/ Talk to us on our blog:

Tangible Bits: Beyond Pixels

by Hiroshi Ishii , 2008
"... Tangible user interfaces (TUIs) provide physical form to digital information and computation, facilitating the direct manipulation of bits. Our goal in TUI development is to empower collaboration, learning, and design by using digital technology and at the same time taking advantage of human abiliti ..."
Abstract - Cited by 73 (4 self) - Add to MetaCart
Tangible user interfaces (TUIs) provide physical form to digital information and computation, facilitating the direct manipulation of bits. Our goal in TUI development is to empower collaboration, learning, and design by using digital technology and at the same time taking advantage of human

MULTI-BIT DIGITAL WATERMARKING BASED ON BIT DECOMPOSITION

by Fanf Li, Xun Luo, Feijun Dai, Fei Liu, Communicated Ping Luo
"... Abstract. Considering the property of multiple information bits of gray level watermarks, we propose classifying gray level watermark bits via bit plane decomposition and then embedding them according to the principle of pref-erentially ensuring the security of the significant bits. As such, we intr ..."
Abstract - Add to MetaCart
Abstract. Considering the property of multiple information bits of gray level watermarks, we propose classifying gray level watermark bits via bit plane decomposition and then embedding them according to the principle of pref-erentially ensuring the security of the significant bits. As such, we

Hot topic: physical-layer network coding

by Shengli Zhang - in Proc. of ACM Mobicom , 2006
"... A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated ..."
Abstract - Cited by 190 (18 self) - Add to MetaCart
. Specifically, we propose a physicallayer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to “straightforward ” network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving

Gaps and bits: Conceptualizing measurements for digital divide/s

by Karine Barzilai-nahon - The Information Society , 2006
"... Three arguments are raised in this article with regard to the indices used to measure the digital divide. First, I criticize policy-makers who rely on simplistic measures of the digital divide, at the expense of a thoughtful analysis of (1) the purpose of the tool, (2) the level of observation, and ..."
Abstract - Cited by 38 (1 self) - Add to MetaCart
Three arguments are raised in this article with regard to the indices used to measure the digital divide. First, I criticize policy-makers who rely on simplistic measures of the digital divide, at the expense of a thoughtful analysis of (1) the purpose of the tool, (2) the level of observation

BitLocker - the end of digital forensics

by Andrew Woodward - Proceedings of 4th Australian Digital Forensics Conference , 2006
"... Microsoft’s upcoming operating system release, Windows Vista, contains the option to encrypt all information on a hard drive. Previous versions of Windows have used the encrypting file system (EFS), allowing users to selectively encrypt files and folders on a drive. The technology is called BitLocke ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Microsoft’s upcoming operating system release, Windows Vista, contains the option to encrypt all information on a hard drive. Previous versions of Windows have used the encrypting file system (EFS), allowing users to selectively encrypt files and folders on a drive. The technology is called Bit
Next 10 →
Results 11 - 20 of 5,968
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University