咨询与建议

限定检索结果

文献类型

  • 45 篇 会议
  • 8 册 图书
  • 5 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 59 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 42 篇 工学
    • 29 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 10 篇 电气工程
    • 9 篇 信息与通信工程
    • 8 篇 光学工程
    • 6 篇 测绘科学与技术
    • 5 篇 电子科学与技术(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 控制科学与工程
    • 1 篇 安全科学与工程
  • 34 篇 理学
    • 30 篇 数学
    • 24 篇 物理学
    • 2 篇 统计学(可授理学、...
  • 17 篇 医学
    • 17 篇 临床医学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...

主题

  • 9 篇 pattern recognit...
  • 8 篇 image compressio...
  • 7 篇 encryption
  • 4 篇 neural networks
  • 4 篇 image coding
  • 3 篇 data compression
  • 3 篇 adaptive pattern...
  • 2 篇 image encryption
  • 2 篇 applications of ...
  • 2 篇 arithmetic codin...
  • 2 篇 entropy
  • 2 篇 functional analy...
  • 2 篇 computer imaging...
  • 2 篇 cryptography
  • 1 篇 internet of thin...
  • 1 篇 data encryption ...
  • 1 篇 computer science
  • 1 篇 intraoperative p...
  • 1 篇 symmetric key cr...
  • 1 篇 causality

机构

  • 4 篇 university of fl...
  • 4 篇 univ florida dep...
  • 1 篇 univ latvia fac ...
  • 1 篇 univ wisconsin d...
  • 1 篇 kyiv univ kyiv
  • 1 篇 hong kong polyte...
  • 1 篇 lebanese amer un...
  • 1 篇 department of el...
  • 1 篇 inst space sci b...
  • 1 篇 shinshu univ fac...
  • 1 篇 department of ma...
  • 1 篇 hohai univ dept ...
  • 1 篇 department of ma...
  • 1 篇 univ leicester u...
  • 1 篇 indian inst tech...
  • 1 篇 frontier technol...
  • 1 篇 univ massachuset...
  • 1 篇 cidetec ipn aven...
  • 1 篇 sandia natl labs...
  • 1 篇 department of ar...

作者

  • 6 篇 schmalz mark s.
  • 5 篇 ritter gerhard x...
  • 4 篇 mark steven schm...
  • 2 篇 astola jaakko t.
  • 2 篇 hayden eric
  • 1 篇 gervasi osvaldo
  • 1 篇 hassan gamal a.
  • 1 篇 zanarini m.
  • 1 篇 shen yao
  • 1 篇 xu haiyan
  • 1 篇 mitrea m.
  • 1 篇 hayden eric t.
  • 1 篇 musatenko yurij ...
  • 1 篇 schmalz ms
  • 1 篇 kamble shailesh ...
  • 1 篇 uchill j
  • 1 篇 pujol j
  • 1 篇 kurashov vitalij...
  • 1 篇 bartolini f
  • 1 篇 kalienky d

语言

  • 59 篇 英文
检索条件"任意字段=Mathematics of Data/Image Pattern Coding, Compression, and Encryption with Applications XIII"
59 条 记 录,以下是31-40 订阅
排序:
Proceedings of SPIE mathematics of data/image coding, compression, and encryption VIII, with applications
Proceedings of SPIE Mathematics of Data/Image Coding, Compre...
收藏 引用
mathematics of data/image coding, compression, and encryption VIII, with applications
The proceedings contain 21 papers. The topics discussed include: a cryptanalysis procedure of the data encryption standard;an adaptive watermarking scheme in the DCT domain;robust video watermarking using additional w... 详细信息
来源: 评论
Uniform quantization error for Laplacian sources with applications to JPEG standard
Uniform quantization error for Laplacian sources with applic...
收藏 引用
Conference on mathematics of data/image coding, compression, and encryption
作者: Minguillón, J Pujol, J Univ Autonoma Barcelona Bellaterra Spain
In this paper we propose a novel method for computing JPEG quantization matrices based on desired mean square error, avoiding the classical trial and error procedure. First, we use a relationship between a Laplacian s... 详细信息
来源: 评论
A cryptanalysis procedure of the data encryption standard
A cryptanalysis procedure of the data encryption standard
收藏 引用
mathematics of data/image coding, compression, and encryption VIII, with applications
作者: Silva G., Victor Manuel CIDETEC IPN Avenida Te #950 C.P. 08400 Mexico D.F. Mexico
In this paper an attack strategy on the data encryption Standard (DES) that is different from the existing ones is developed. The attack strategy is based on a theorem proved by the author, called LR theorem. The atta... 详细信息
来源: 评论
Classifying spectra based on DLS and rough set
Classifying spectra based on DLS and rough set
收藏 引用
Conference on mathematics of data/image coding, compression and encryption V, with applications
作者: Qiu, B Hu, ZY Zhao, YH Natl Lab Pattern Recognit Beijing Peoples R China
Until now, it is still difficult to identify different kinds of celestial bodies depending on their spectra, because it needs a lot of astronomers' manual work of measuring, marking and identifying, which is gener... 详细信息
来源: 评论
On encryption-compression tradeoff of pre/post-filtered images
On encryption-compression tradeoff of pre/post-filtered imag...
收藏 引用
mathematics of data/image coding, compression, and encryption VIII, with applications
作者: Gurijala, Aparna Khayam, Syed A. Radha, Hayder Deller Jr., J.R. Department of Electrical and Computer Engineering 2120 Engineering Building Michigan State University East Lansing MI 48824
Advances in network communications have necessitated secure local-storage and transmission of multimedia content. In particular, military networks need to securely store sensitive imagery which at a later stage may be... 详细信息
来源: 评论
Watermarking-based protection of remote sensing images: requirements and possible solutions
Watermarking-based protection of remote sensing images: requ...
收藏 引用
4th Conference on mathematics of image and data coding, compression, and encryption
作者: Barni, M Bartolini, F Cappellini, V Magli, E Olmo, G Univ Siena Dept Informat Engn I-53100 Siena Italy
Earth observation missions have recently attracted a growing interest from the scientific and industrial communities, mainly due to the large number of possible applications capable to exploit remotely sensed data and... 详细信息
来源: 评论
The synaptic morphological perceptron
The synaptic morphological perceptron
收藏 引用
Conference on mathematics of data/image pattern Recognition, compression and encryption with Application IX
作者: Myers, Daniel S. Sandia Natl Labs Albuquerque NM 87185 USA
In recent years, several researchers have constructed novel neural network models based on lattice algebra. Because of computational similarities to operations in the system of image morphology, these models are often... 详细信息
来源: 评论
Maximizing reading: pattern analysis to describe points of gaze
Maximizing reading: pattern analysis to describe points of g...
收藏 引用
Conference on mathematics of data/image pattern Recognition, compression and encryption with Application IX
作者: Paeglis, Roberts Bagucka, Kristine Sjakste, Nikolajs Lacis, Ivars Latvian Univ Dept Vis Sci 8 Kengaraga Str LV-1063 Riga Latvia Univ Latvia Fac Med LV-1001 Riga Latvia
As people read texts, their points of gaze can be described either as a sequence or as a pattern of dots. If reading fixations are visualized as a pattern and their duration is graphically attributed to the 3(rd) dime... 详细信息
来源: 评论
Bit plane encoding and encryption
收藏 引用
2nd International Conference on pattern Recognition and Machine Intelligence
作者: Yekkala, Anil Madhavan, C. E. Veni Philips Elect India Ltd Bangalore Karnataka India Indian Inst Sci Bangalore Karnataka India
The rapid growth in multimedia based Internet systems and applications like video telephony, video on demand and also tele-medicine has created a great need for multimedia security. One of the important requirements f... 详细信息
来源: 评论
Comparison of wavelet and Karhunen-Loeve transforms in video compression applications
Comparison of wavelet and Karhunen-Loeve transforms in video...
收藏 引用
Proceedings of the 1999 mathematics of data/image coding, compression, and encryption II
作者: Musatenko, Yurij S. Soloveyko, Olexandr M. Kurashov, Vitalij N. Kyiv Univ Kyiv Ukraine
In the paper we present comparison of three advanced techniques for video compression. Among them 3D Embedded Zerotree Wavelet (EZW) coding, recently suggested Optimal image coding using Karhunen-Loeve (KL) transform ... 详细信息
来源: 评论