Results 161 to 170 of about 2,122,188 (202)
Some of the next articles are maybe not open access.
TranLogs: Lossless Failure Recovery Empowered by Training Logs
2024 International Conference on Networking, Architecture and Storage (NAS)When running deep learning training jobs, in order to prevent training loss due to softwarelhardware failures, a checkpointing mechanism is usually used to periodically store snapshots of the training model in non-volatile memory to facilitate recovery ...
Xiaoyu Liu, Lingfang Zeng
semanticscholar +2 more sources
Polynomial-Based Secret Image Sharing Scheme with Fully Lossless Recovery
International Journal of Digital Crime and Forensics, 2018Lossless recovery is important for the transmission and storage of image data. In polynomial-based secret image sharing, despite many previous researchers attempted to achieve lossless recovery, none of the proposed work can simultaneously satisfy an efficiency execution and at no cost of some storage capacity.
Wanmeng Ding +3 more
semanticscholar +2 more sources
On distributed successive refinement with lossless recovery
2014 IEEE International Symposium on Information Theory, 2014The problem of successive refinement in distributed source coding and in joint source-channel coding is considered. The emphasis is placed on the case where the sources have to be recovered losslessly in the second stage. In distributed source coding, it is shown that all sources are successively refinable in sum rate, with respect to any (joint ...
Chien-Yi Wang, M. Gastpar
semanticscholar +2 more sources
Protecting Tampered Images with Lossless Auto Recovery using improved INN
2024 2nd International Conference on Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA)The Image Immunizer project presents a novel strategy to address the risk of manipulation associated with digital photos. It uses Vaccinator and Invertible Neural Network technologies to provide a complete solution that guarantees tamper resistance and ...
R. Bharathi +4 more
semanticscholar +2 more sources
Perceptually Lossless Image Compression with Error Recovery
Proceedings of the 2nd International Conference on Vision, Image and Signal Processing, 2018In many bandwidth constrained applications, lossless compression may be unnecessary, as only two to three times of compression can be achieved. An alternative way to save bandwidth is to adopt perceptually lossless compression, which can attain eight ...
C. Kwan, Eric Shang, T. Tran
semanticscholar +2 more sources
Perceptually lossless compression of Mastcam images with error recovery
Signal Processing, Sensor/Information Fusion, and Target Recognition XXVIII, 2019We present a high performance image compression framework for Mastcam images in the Mars rover Curiosity. First, we aim at achieving perceptually lossless compression. Four well-known image codecs in the literature have been evaluated and the performance
C. Kwan, Jude Larkin, Bryan Chou
semanticscholar +2 more sources
Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery
IEEE Transactions on Dependable and Secure ComputingResisting the operations in lossy channels is a challenge for image steganography. In this article, we propose a novel robust steganographic method to resist the image downsampling operation.
Sheng Li +3 more
semanticscholar +2 more sources
Tamper Localization and Lossless Recovery Watermarking Scheme
International Conference on Software Engineering and Computer Systems, 2011Tamper localization and recovery watermarking scheme can be used to protect the integrity and authenticity of medical images. In this paper, a simple tamper localization and recovery scheme that uses lossless compression was proposed. Lossy compression may also be applied when necessary.
Siau-Chuin Liew, J. Zain
semanticscholar +2 more sources
DSIS: A Novel (K,N) Threshold Deniable Secret Image Sharing Scheme with Lossless Recovery
ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)Secret image sharing (SIS) schemes have undergone significant development. However, to the best of our knowledge, none of the existing schemes has considered the deniable property during secret sharing.
Zikai Xu +4 more
semanticscholar +2 more sources
IEEE Transactions on Industrial Electronics, 2020
In this letter, we introduce a simple turn-on snubber for the conventional bidirectional converter. This snubber notably reduces the current reduction rate of the converter main diodes at turn-off.
M. Mohammadi
semanticscholar +3 more sources
In this letter, we introduce a simple turn-on snubber for the conventional bidirectional converter. This snubber notably reduces the current reduction rate of the converter main diodes at turn-off.
M. Mohammadi
semanticscholar +3 more sources

