Results 11 - 20
of
5,968
The JPEG2000 Still Image Coding System: an Overview
, 2000
"... With the increasing use of multimedia technologies, image compression requires higher performance as well as new features. To address this need in the specific area of still image encoding, a new standard is currently being developed, the JPEC2000. It is not only intended to provide rate-distortion ..."
Abstract
-
Cited by 259 (2 self)
- Add to MetaCart
by pixel accuracy and by resolution, robustness to the presence of bit-errors and region-of-interest coding, are some representative features. It is interesting to note that JPEG2000 is being designed to address the requirements of a diversity of applications, e.g. Internet, color facsimile, printing
The Elliptic Curve Digital Signature Algorithm (ECDSA)
, 1999
"... The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI standard, and was accepted in 2000 as IEEE and NIST standards. It was also accepted in 1998 as an ISO standard, and is under consideratio ..."
Abstract
-
Cited by 183 (5 self)
- Add to MetaCart
The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI standard, and was accepted in 2000 as IEEE and NIST standards. It was also accepted in 1998 as an ISO standard, and is under
Architectural Power Analysis: The Dual Bit Type Method
, 1995
"... This paper describes a novel strategy for generating accurate black-box models of datapath power consumption at the architecture level. This is achieved by recognizing that power consumption in digital circuits is affected by activity, as well as physical capacitance. Since existing strategies chara ..."
Abstract
-
Cited by 141 (6 self)
- Add to MetaCart
This paper describes a novel strategy for generating accurate black-box models of datapath power consumption at the architecture level. This is achieved by recognizing that power consumption in digital circuits is affected by activity, as well as physical capacitance. Since existing strategies
Perceptual Coding of Digital Audio
- Proceedings of the IEEE
, 2000
"... During the last decade, CD-quality digital audio has essentially replaced analog audio. Emerging digital audio applications for network, wireless, and multimedia computing systems face a series of constraints such as reduced channel bandwidth, limited storage capacity, and low cost. These new applic ..."
Abstract
-
Cited by 158 (3 self)
- Add to MetaCart
applications have created a demand for high-quality digital audio delivery at low bit rates. In response to this need, considerable research has been devoted to the development of algorithms for perceptually transparent coding of high-fidelity (CD-quality) digital audio. As a result, many algorithms have been
Digital Preservation Bits
, 2014
"... Visit us at: digitalpreservation.gov/ Talk to us on our blog: ..."
Tangible Bits: Beyond Pixels
, 2008
"... Tangible user interfaces (TUIs) provide physical form to digital information and computation, facilitating the direct manipulation of bits. Our goal in TUI development is to empower collaboration, learning, and design by using digital technology and at the same time taking advantage of human abiliti ..."
Abstract
-
Cited by 73 (4 self)
- Add to MetaCart
Tangible user interfaces (TUIs) provide physical form to digital information and computation, facilitating the direct manipulation of bits. Our goal in TUI development is to empower collaboration, learning, and design by using digital technology and at the same time taking advantage of human
MULTI-BIT DIGITAL WATERMARKING BASED ON BIT DECOMPOSITION
"... Abstract. Considering the property of multiple information bits of gray level watermarks, we propose classifying gray level watermark bits via bit plane decomposition and then embedding them according to the principle of pref-erentially ensuring the security of the significant bits. As such, we intr ..."
Abstract
- Add to MetaCart
Abstract. Considering the property of multiple information bits of gray level watermarks, we propose classifying gray level watermark bits via bit plane decomposition and then embedding them according to the principle of pref-erentially ensuring the security of the significant bits. As such, we
Hot topic: physical-layer network coding
- in Proc. of ACM Mobicom
, 2006
"... A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes simultaneously. Rather than a blessing, this feature is treated ..."
Abstract
-
Cited by 190 (18 self)
- Add to MetaCart
. Specifically, we propose a physicallayer network coding (PNC) scheme to coordinate transmissions among nodes. In contrast to “straightforward ” network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving
Gaps and bits: Conceptualizing measurements for digital divide/s
- The Information Society
, 2006
"... Three arguments are raised in this article with regard to the indices used to measure the digital divide. First, I criticize policy-makers who rely on simplistic measures of the digital divide, at the expense of a thoughtful analysis of (1) the purpose of the tool, (2) the level of observation, and ..."
Abstract
-
Cited by 38 (1 self)
- Add to MetaCart
Three arguments are raised in this article with regard to the indices used to measure the digital divide. First, I criticize policy-makers who rely on simplistic measures of the digital divide, at the expense of a thoughtful analysis of (1) the purpose of the tool, (2) the level of observation
BitLocker - the end of digital forensics
- Proceedings of 4th Australian Digital Forensics Conference
, 2006
"... Microsoft’s upcoming operating system release, Windows Vista, contains the option to encrypt all information on a hard drive. Previous versions of Windows have used the encrypting file system (EFS), allowing users to selectively encrypt files and folders on a drive. The technology is called BitLocke ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Microsoft’s upcoming operating system release, Windows Vista, contains the option to encrypt all information on a hard drive. Previous versions of Windows have used the encrypting file system (EFS), allowing users to selectively encrypt files and folders on a drive. The technology is called Bit
Results 11 - 20
of
5,968