We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 10,000 results
  1. Audio Compression Using Transform Coding with LZW and Double Shift Coding

    The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media...
    Conference paper 2021
  2. DySHARQ: Dynamic Software-Defined Hardware-Managed Queues for Tile-Based Architectures

    The recent trend towards tile-based manycore architectures has helped to tackle the memory wall by physically distributing memories and processing...

    Sven Rheindt, Sebastian Maier, ... Andreas Herkersdorf in International Journal of Parallel Programming
    Article 20 November 2020
  3. Cover selection technique for secure transform domain image steganography

    In image steganography, an appropriate cover selection offers the least detectable stego image thereby assuring the security of covert communication....

    Mansi S. Subhedar in Iran Journal of Computer Science
    Article 07 January 2021
  4. MPC with Delayed Parties over Star-Like Networks

    This paper examines multi-party computation protocols in the presence of two major constraints commonly encountered in deployed systems. Firstly, we...
    Mariana Gama, Emad Heydari Beni, ... Oliver Zajonc in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  5. Real-time signal queue length prediction using long short-term memory neural network

    Optimal traffic control and signal planning can significantly reduce traffic congestion and potential delays at intersections. However, a major...

    Rezaur Rahman, Samiul Hasan in Neural Computing and Applications
    Article 24 July 2020
  6. Dataset Building for Handwritten Kannada Vowels Using Unsupervised and Supervised Learning Methods

    In the era of automation, recognition of the Kannada handwritten characters is an inevitable task as it has widespread applications in the...
    Chandravva Hebbi, Omkar Metri, ... H. R. Mamatha in Advances in Signal Processing and Intelligent Recognition Systems
    Conference paper 2021
  7. Duplication Scheduling with Bottom-Up Top-Down Recursive Neural Network

    Scientific workflows can be represented as directed acyclic graphs (DAGs) with nodes corresponding to individual tasks and directed edges between the...
    Vahab Samandi, Peter Tiňo, Rami Bahsoon in Intelligent Data Engineering and Automated Learning – IDEAL 2022
    Conference paper 2022
  8. Exploring Classic and Neural Lexical Translation Models for Information Retrieval: Interpretability, Effectiveness, and Efficiency Benefits

    We study the utility of the lexical translation model (IBM Model 1) for English text retrieval, in particular, its neural variants that are trained...
    Leonid Boytsov, Zico Kolter in Advances in Information Retrieval
    Conference paper 2021
  9. A presentation and retrieval hash scheme of images based on principal component analysis

    Image representation and approximate query is always a research challenge and is affected greatly by the dimension and size of images. Since...

    Chunyan Shuai, Xu Wang, ... Jun Yang in The Visual Computer
    Article 20 October 2020
  10. Discrete Denoising Diffusion Approach to Integer Factorization

    Integer factorization is a famous computational problem unknown whether being solvable in the polynomial time. With the rise of deep neural networks,...
    Kārlis Freivalds, Emīls Ozoliņš, Guntis Bārzdiņš in Artificial Neural Networks and Machine Learning – ICANN 2023
    Conference paper 2023
  11. Metaheuristic-based vector quantization approach: a new paradigm for neural network-based video compression

    Video compression has great significance in the communication of motion pictures. Video compression techniques try to remove the different types of...

    Saad M. Darwish, Ahmed A. J. Almajtomi in Multimedia Tools and Applications
    Article 28 October 2020
  12. Object-Centric Alignments

    Processes tend to interact with other processes and operate on various objects of different types. These objects can influence each other creating...
    Lukas Liss, Jan Niklas Adams, Wil M. P. van der Aalst in Conceptual Modeling
    Conference paper 2023
  13. Complete Quality Preserving Data Hiding in Animated GIF with Reversibility and Scalable Capacity Functionalities

    A technique is put forward to hide data into an animated GIF by exploiting the transparent pixels. Specifically, a new frame is crafted based on the...
    KokSheik Wong, Mohamed N. M. Nazeeb, Jean-Luc Dugelay in Digital Forensics and Watermarking
    Conference paper 2021
  14. Exploiting Algebraic Structures in Probing Security

    The so-called \(\omega \) -encoding, introduced...
    Conference paper 2023
  15. \(\mathsf {Rabbit}\) : Efficient Comparison for Secure Multi-Party Computation

    Secure comparison has been a fundamental challenge in privacy-preserving computation, since its inception as Yao’s millionaires’ problem (FOCS 1982)....
    Eleftheria Makri, Dragos Rotaru, ... Sameer Wagh in Financial Cryptography and Data Security
    Conference paper 2021
  16. Hamiltonicity of k-Sided Pancake Networks with Fixed-Spin: Efficient Generation, Ranking, and Optimality

    We present a Hamilton cycle in the k -sided pancake network and four combinatorial algorithms to traverse the cycle. The network’s vertices are...

    Ben Cameron, Joe Sawada, ... Aaron Williams in Algorithmica
    Article 22 August 2022
  17. Encryption to the Future

    A number of recent works have constructed cryptographic protocols with flavors of adaptive security by having a randomly-chosen anonymous committee...
    Matteo Campanelli, Bernardo David, ... Jesper Buus Nielsen in Advances in Cryptology – ASIACRYPT 2022
    Conference paper 2022
  18. Rapid Structure from Motion Frame Selection for Markerless Monocular SLAM

    Simultaneous Localization and Map** (SLAM) is a method to simultaneously map the environment and estimate the location and pose of an agent. Visual...
    Blake Troutman, Mihran Tuceryan in Robotics, Computer Vision and Intelligent Systems
    Conference paper 2022
  19. Symbolic Transformation of Expressions in Modular Arithmetic

    We present symbolic methods to improve the precision of static analyses of modular integer expressions based on Abstract Interpretation. Like similar...
    Jérôme Boillot, Jérôme Feret in Static Analysis
    Conference paper 2023
  20. Higher Order Statistical Analysis in Multiresolution Domain - Application to Breast Cancer Histopathology

    Objective is to analyze textures in breast histopathology images for cancer diagnosis. Background: It is observed that breast cancer has second...
    Durgamahanthi Vaishali, P. Vishnu Priya, ... K. Venkat Ratna Prabha in Service-Oriented Computing – ICSOC 2020 Workshops
    Conference paper 2021
Did you find what you were looking for? Share feedback.