Results 1  10
of
5,445
The JPEG still picture compression standard
 Communications of the ACM
, 1991
"... This paper is a revised version of an article by the same title and author which appeared in the April 1991 issue of Communications of the ACM. For the past few years, a joint ISO/CCITT committee known as JPEG (Joint Photographic Experts Group) has been working to establish the first international c ..."
Abstract

Cited by 1138 (0 self)
 Add to MetaCart
This paper is a revised version of an article by the same title and author which appeared in the April 1991 issue of Communications of the ACM. For the past few years, a joint ISO/CCITT committee known as JPEG (Joint Photographic Experts Group) has been working to establish the first international
The job content questionnaire (JCQ): an instrument for internationally comparative assessments of psychological job characteristics
 J Occup Health Psychol
, 1998
"... Part I discusses the Job Content Questionnaire (JCQ), designed to measure scales assessing psychological demands, decision latitude, social support, physical demands, and job insecurity. Part II describes the reliability of the JCQ scales in a crossnational context using 10,288 men and 6,313 women ..."
Abstract

Cited by 330 (8 self)
 Add to MetaCart
from 6 studies conducted in 4 countries. Substantial similarity in means, standard deviations, and correlations among the scales, and in correlations between scales and demographic variables, is found for both men and women in all studies. Reliability is good for most scales. Results suggest
Gravity coupled with matter and the foundation of non commutative geometry
, 1996
"... We first exhibit in the commutative case the simple algebraic relations between the algebra of functions on a manifold and its infinitesimal length element ds. Its unitary representations correspond to Riemannian metrics and Spin structure while ds is the Dirac propagator ds = ×— × = D −1 where D i ..."
Abstract

Cited by 343 (17 self)
 Add to MetaCart
We first exhibit in the commutative case the simple algebraic relations between the algebra of functions on a manifold and its infinitesimal length element ds. Its unitary representations correspond to Riemannian metrics and Spin structure while ds is the Dirac propagator ds = ×— × = D −1 where D
Guidelines for evaluating and expressing the uncertainty of NIST measurement results
, 1994
"... Preface to the 1994 Edition The previous edition, which was the first, of this National Institute of Standards and Technology (NIST) Technical Note (TN 1297) was initially published in January 1993. A second printing followed shortly thereafter, and in total some 10 000 copies were distributed to in ..."
Abstract

Cited by 340 (1 self)
 Add to MetaCart
Preface to the 1994 Edition The previous edition, which was the first, of this National Institute of Standards and Technology (NIST) Technical Note (TN 1297) was initially published in January 1993. A second printing followed shortly thereafter, and in total some 10 000 copies were distributed
The JPEG2000 still image compression standard
 IEEE Signal Proc. Mag
, 2001
"... The development of standards (emerging and established) by the International Organization for Standardization (ISO), the International Telecommunications Union (ITU), and the International Electrotechnical Commission (IEC) for audio, image, and video, for both transmission and storage, has led to wo ..."
Abstract

Cited by 180 (11 self)
 Add to MetaCart
and ingenuity. Since the mid 1980s, members from both the ITU and the ISO have been working together to establish a joint international standard for the compression of grayscale and color still images. This effort has been known as JPEG, the Joint
The Similarity Metric
 IEEE TRANSACTIONS ON INFORMATION THEORY
, 2003
"... A new class of distances appropriate for measuring similarity relations between sequences, say one type of similarity per distance, is studied. We propose a new "normalized information distance", based on the noncomputable notion of Kolmogorov complexity, and show that it is in this class ..."
Abstract

Cited by 281 (34 self)
 Add to MetaCart
distinctive applications in widely divergent areas using standard compression programs like gzip and GenCompress. First, we compare whole mitochondrial genomes and infer their evolutionary history. This results in a first completely automatic computed whole mitochondrial phylogeny tree. Secondly, we fully
The ventriloquist effect results from nearoptimal bimodal integration
 Curr. Biol
, 2004
"... Results for the various unimodal location discriminations for naive observer L.M. are shown in Figure 1A. The curves plot the proportion of trials in which the second stimulus was seen to the left of the first, as a function of actual physical displacement. Following standard practice, the data were ..."
Abstract

Cited by 277 (13 self)
 Add to MetaCart
Results for the various unimodal location discriminations for naive observer L.M. are shown in Figure 1A. The curves plot the proportion of trials in which the second stimulus was seen to the left of the first, as a function of actual physical displacement. Following standard practice, the data
Algorithms for Parallel Memory I: TwoLevel Memories
, 1992
"... We provide the first optimal algorithms in terms of the number of input/outputs (I/Os) required between internal memory and multiple secondary storage devices for the problems of sorting, FFT, matrix transposition, standard matrix multiplication, and related problems. Our twolevel memory model is n ..."
Abstract

Cited by 235 (27 self)
 Add to MetaCart
We provide the first optimal algorithms in terms of the number of input/outputs (I/Os) required between internal memory and multiple secondary storage devices for the problems of sorting, FFT, matrix transposition, standard matrix multiplication, and related problems. Our twolevel memory model
The Security of the Cipher Block Chaining Message Authentication Code
, 2000
"... Let F be some block cipher (eg., DES) with block length l. The Cipher Block Chaining Message Authentication Code (CBC MAC) specifies that an mblock message x: Xl...xm be authenticated among parties who share a secret key a for the block cipher by tagging x with a prefix of ym, where Y0: 01 and Y ..."
Abstract

Cited by 240 (41 self)
 Add to MetaCart
and Yi: Fa(miYi1) for i: 1,2,...,m. This method is a pervasively used international and U.S. standard. We provide its first formal justification, showing the following general lemma: cipher block chaining a pseudorandom function yields a pseudorandom function. Underlying our results is a technical
Extracting Support Data for a Given Task
 Proceedings, First International Conference on Knowledge Discovery & Data Mining, Menlo Park
, 1995
"... We report a novel possibility for extracting a small subset of a data base which contains all the information necessary to solve a given classification task: using the Support Vector Algorithm to train three different types of handwritten digit classifiers, we observed that these types of classifier ..."
Abstract

Cited by 223 (32 self)
 Add to MetaCart
. Uthurusamy (eds.): Proceedings, First International Conference on Knowledge Discovery & Data Mining. AAA...
Results 1  10
of
5,445