نتایج جستجو برای: network 2000
تعداد نتایج: 832945 فیلتر نتایج به سال:
This paper provides a managerial account of network governance by exploring how initially non-powerful agents, driven by the quest for distinctive identity, shape the governance of their networks over time. The research design is that of a longitudinal comparative case study of the trajectories of three renowned, Oscar-winning Spanish filmmakers. It scrutinizes data coming from original intervi...
Classification of hyperspectral images is paramount to an increasing number of user applications. With the advent of more powerful technology, sensed images demand for larger requirements in computational and memory capabilities, which has led to devise compression techniques to alleviate the transmission and storage necessities. Classification of compressed images is addressed in this paper. C...
Université de Caen Basse Normandie LUSAC EA-2607, Groupe Vision et Analyse d'Images 120, route de l'exode, 50000 Saint-Lô, France Phone : +33 (0)2 33 77 55 11 Fax : +33 (0)2 33 77 11 67 E-mail: [email protected] Université Laval Département de génie électrique et de génie informatique Laboratoire de Vision et de Syst emes Numériques Pavillon Pouliot Quebec, QC, Canada, G1K 7P4 Phone: (...
Information hiding in JPEG2000 compressed images is investigated in this research. The challenges of covert communication in this state-of-the-art image codec are analyzed and a steganographic scheme is then proposed to reliably embed high-volume data into the JPEG2000 bitstream. A special mode of JPEG2000 is employed, and its usage and functions are explained and justified. Experimental result...
Scalable encoded information, as in the JPEG 2000 standard, results in files which can be truncated at an arbitrary point and decoded. This work introduces a tractable, yet flexible model appropriate for resource management involving scalably encoded information. At its core is a function yielding a measure of “quality” of the decoded information as a function of the number of bits chosen for d...
In this work, JPEG2000 error resilience options and error concealment strategies are discussed and evaluated. Error resilience options and error concealment strategies have been employed to mimic attacks against selective / partial JPEG2000 encryption schemes. Thus the security evaluation of these selective / partial encryption schemes relies on the proper working of the JPEG2000 error concealm...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید