Hot Search : Source embeded web remote control p2p game More...
Location : Home SourceCode Graph program
Graph program list
Sort by :
« 1 2 ... .57 .58 .59 .60 .61 18062.63 .64 .65 .66 .67 ... 18705 »
Downloaded:0
color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract :
Update : 2008-10-13 Size : 232.63kb Publisher : ghostsx


Update : 2008-10-13 Size : 5.02kb Publisher : 附件

Downloaded:0
Blind digital watermarking technology Min, Li Yun Ping, Liang Hua (China University of Petroleum Engineering Department of Electronic Information, Beijing 102249) Abstract : Digital watermarking technique is addressing t
Update : 2008-10-13 Size : 238.24kb Publisher : ghostsx

Downloaded:0
based digital watermarking Jiang Yong (Southwest University of Science and Technology Computer Science and Technology Institute in Sichuan Mianyang 621010) Abstract : the development of network technology for the transmi
Update : 2008-10-13 Size : 129.22kb Publisher : ghostsx

Downloaded:0
interview with the protection of digital watermarking Huaqi Information vice president, Huaqi, president of the Institute, Dr Tin
Update : 2008-10-13 Size : 864.46kb Publisher : ghostsx

Downloaded:0
confrontation geometric digital watermarking method of attack paste net, Taiwan-Li-chun, Zhang requested (Tongji University Department of Computer Science and Engineering, Shanghai 200092) engage vines : presents a new i
Update : 2008-10-13 Size : 194.76kb Publisher : ghostsx

Downloaded:0
yuv Video y, u, v 3 components were various channel filtering
Update : 2008-10-13 Size : 2.8kb Publisher : 左伟

Downloaded:0
for JPG file showed code for all procedures.
Update : 2008-10-13 Size : 318.07kb Publisher : caoxinghua

Downloaded:0
2D triangular mesh subdivision, and at the same time establishing a new triangular mesh topology
Update : 2008-10-13 Size : 1.09kb Publisher : wu

Downloaded:0
Face Image rotation matrix applications, standardized images can be used for facial image recognition applications
Update : 2008-10-13 Size : 1.29kb Publisher : wu

Downloaded:0
poser derived from the Face Model and Matlab under reconstruction, from vertex, Vector information law for redevelopment
Update : 2008-10-13 Size : 486.3kb Publisher : wu

Downloaded:0
canny algorithm. . I wrote it myself. . See. . The results were pretty good
Update : 2008-10-13 Size : 3.17mb Publisher : 崔一
« 1 2 ... .57 .58 .59 .60 .61 18062.63 .64 .65 .66 .67 ... 18705 »
CodeBus is the largest source code store in internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.