Results 61 to 70 of about 20,202 (179)

An Extended Krylov Subspace Method for Decoding Edge‐Based Compressed Images by Homogeneous Diffusion

open access: yesNumerical Linear Algebra with Applications, Volume 33, Issue 1, February 2026.
ABSTRACT The heat equation is often used to inpaint dropped data in inpainting‐based lossy compression schemes. We propose an alternative way to numerically solve the heat equation by an extended Krylov subspace method. The method is very efficient with respect to the computation of the solution of the heat equation at large times.
Volker Grimm, Kevin Liang
wiley   +1 more source

High β‐diversity in fig wasp communities driven by species turnover in widely distributed Neotropical fig trees

open access: yesOikos, Volume 2026, Issue 2, February 2026.
Wasp communities associated with fig trees, Ficus spp., are a model system to investigate how local and regional processes shape biodiversity across large geographical ranges. We investigated the β‐diversity of fig wasp assemblages associated with three widely distributed Neotropical fig species – F. citrifolia, F. obtusifolia and F. pertusa – using 27
Elmecelli Moraes de Castro Souza   +6 more
wiley   +1 more source

The HK Index: A Disjointness‐Driven Model for Intelligent Ranking of Scientific Impact

open access: yesExpert Systems, Volume 43, Issue 2, February 2026.
ABSTRACT Accurately predicting scientific impact and ranking researchers remains a central yet complex challenge in research evaluation. Traditional metrics such as citation counts, publication totals, hybrid measures, and h‐type indices each capture limited aspects of scholarly influence, making it difficult to establish a universally accepted ...
Ghulam Mustafa   +4 more
wiley   +1 more source

Perceptual Copyright Protection Using Multiresolution Wavelet-Based Watermarking And Fuzzy Logic

open access: yes, 2010
In this paper, an efficiently DWT-based watermarking technique is proposed to embed signatures in images to attest the owner identification and discourage the unauthorized copying.
Hsieh, Ming-Shing
core   +3 more sources

New Algorithms and Lower Bounds for Sequential-Access Data Compression [PDF]

open access: yes, 2009
This thesis concerns sequential-access data compression, i.e., by algorithms that read the input one or more times from beginning to end. In one chapter we consider adaptive prefix coding, for which we must read the input character by character ...
Gagie, Travis
core   +2 more sources

Learning Binary Residual Representations for Domain-specific Video Streaming

open access: yes, 2017
We study domain-specific video streaming. Specifically, we target a streaming setting where the videos to be streamed from a server to a client are all in the same domain and they have to be compressed to a small size for low-latency transmission ...
Kautz, Jan   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy