{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T05:10:24Z","timestamp":1769922624350,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,25]],"date-time":"2005-06-25T00:00:00Z","timestamp":1119657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6,25]]},"DOI":"10.1145\/1068009.1068338","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"1961-1968","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Effective image compression using evolved wavelets"],"prefix":"10.1145","author":[{"given":"Uli","family":"Grasemann","sequence":"first","affiliation":[{"name":"University of Texas at Austin, Austin, TX"}]},{"given":"Risto","family":"Miikkulainen","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX"}]}],"member":"320","published-online":{"date-parts":[[2005,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.136597"},{"key":"e_1_3_2_1_2_1","unstructured":"C. M. Brislawn. The fbi fingerprint image compression standard. http:\/\/www.c3.lanl.gov\/~brislawn\/FBI\/FBI.html. C. M. Brislawn. The fbi fingerprint image compression standard. http:\/\/www.c3.lanl.gov\/~brislawn\/FBI\/FBI.html."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.1998.681737"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.817237"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.119732"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02476026"},{"key":"e_1_3_2_1_7_1","volume-title":"Wavelet-based image coding: An overview. Applied and Computational Control, Signals and Circuits, 1(1)","author":"Davis G.","year":"1998","unstructured":"G. Davis and A. Nosratinia . Wavelet-based image coding: An overview. Applied and Computational Control, Signals and Circuits, 1(1) , 1998 . G. Davis and A. Nosratinia. Wavelet-based image coding: An overview. Applied and Computational Control, Signals and Circuits, 1(1), 1998."},{"key":"e_1_3_2_1_8_1","first-page":"294","volume-title":"Qccpack: An open-source software library for quantization, compression, and coding. In e","author":"Fowler J. E.","year":"2000","unstructured":"J. E. Fowler . Qccpack: An open-source software library for quantization, compression, and coding. In e . A. G. Tescher, editor, Applications of Digital Image Processing XIII , volume Proc. SPIE 4115 , pages 294 -- 301 , August 2000 . J. E. Fowler. Qccpack: An open-source software library for quantization, compression, and coding. In e. A. G. Tescher, editor, Applications of Digital Image Processing XIII, volume Proc. SPIE 4115, pages 294--301, August 2000."},{"key":"e_1_3_2_1_9_1","first-page":"1356","volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence","author":"Gomez F.","year":"1999","unstructured":"F. Gomez and R. Miikkulainen . Solving non-markovian control tasks with neuroevolution . In Proceedings of the International Joint Conference on Artificial Intelligence , pages 1356 -- 1361 , San Francisco, CA , 1999 . F. Gomez and R. Miikkulainen. Solving non-markovian control tasks with neuroevolution. In Proceedings of the International Joint Conference on Artificial Intelligence, pages 1356--1361, San Francisco, CA, 1999."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.837556"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24855-2_109"},{"key":"e_1_3_2_1_12_1","volume-title":"Microelectronic Engeneering Research Conference","author":"Hill Y.","year":"2001","unstructured":"Y. Hill , S. O'Keefe , and D. Thiel . An investigation of wavelet design using genetic algorithms . In Microelectronic Engeneering Research Conference , 2001 . Y. Hill, S. O'Keefe, and D. Thiel. An investigation of wavelet design using genetic algorithms. In Microelectronic Engeneering Research Conference, 2001."},{"key":"e_1_3_2_1_13_1","volume-title":"WSQ Gray-scale Fingerprint Image Compression Specification","author":"Hopper T.","year":"1993","unstructured":"T. Hopper , C. M. Brislawn , and J. N. Bradley . WSQ Gray-scale Fingerprint Image Compression Specification . Federal Bureau of Investigation , February 1993 . Document No. IAFIS-IC-0110. T. Hopper, C. M. Brislawn, and J. N. Bradley. WSQ Gray-scale Fingerprint Image Compression Specification. Federal Bureau of Investigation, February 1993. Document No. IAFIS-IC-0110."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/1036095"},{"key":"e_1_3_2_1_15_1","volume-title":"JPEG 2000 - lossless and lossy compression of continuous-tone and bi-level still images. Part I: Minimum decoder. Final committee draft, version 1.0.","author":"I.","year":"2000","unstructured":"I. JTC1\/SC29\/WG1. JPEG 2000 - lossless and lossy compression of continuous-tone and bi-level still images. Part I: Minimum decoder. Final committee draft, version 1.0. , March 2000 . I. JTC1\/SC29\/WG1. JPEG 2000 - lossless and lossy compression of continuous-tone and bi-level still images. Part I: Minimum decoder. Final committee draft, version 1.0., March 2000."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.7551\/mitpress\/2887.003.0025","volume-title":"Evolutionary Programming","author":"Lankhorst M. M.","year":"1995","unstructured":"M. M. Lankhorst and M. D. van der Laan. Wavelet-based signal approximation with genetic algorithms . In Evolutionary Programming , pages 237 -- 255 , 1995 . M. M. Lankhorst and M. D. van der Laan. Wavelet-based signal approximation with genetic algorithms. In Evolutionary Programming, pages 237--255, 1995."},{"issue":"553","key":"e_1_3_2_1_17_1","first-page":"580","article-title":"The disenfranchisement of felons","volume":"20","author":"Lippke R. L.","year":"2001","unstructured":"R. L. Lippke . The disenfranchisement of felons . Law and Philosophy , 20 : 553 -- 580 , Nov 2001 . R. L. Lippke. The disenfranchisement of felons. Law and Philosophy, 20:553 -- 580, Nov 2001.","journal-title":"Law and Philosophy"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/645312.649104"},{"key":"e_1_3_2_1_19_1","volume-title":"Handbook of Fingerprint Recognition","author":"Maltoni D.","year":"2003","unstructured":"D. Maltoni , D. Maio , A. Jain , and S. Prabhakar . Handbook of Fingerprint Recognition . Springer , New York , June 2003 . D. Maltoni, D. Maio, A. Jain, and S. Prabhakar. Handbook of Fingerprint Recognition. Springer, New York, June 2003."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/839285.841506"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/76.499834"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1006\/acha.1996.0015"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0036141095289051"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.403412"},{"key":"e_1_3_2_1_25_1","first-page":"38","article-title":"The jpeg still picture compression standard","author":"Wallace G.","year":"1992","unstructured":"G. Wallace . The jpeg still picture compression standard . IEEE TCE , 38 , 1992 . G. Wallace. The jpeg still picture compression standard. IEEE TCE, 38, 1992.","journal-title":"IEEE TCE"},{"key":"e_1_3_2_1_26_1","volume-title":"Peters","author":"Wickerhauser M.","year":"1994","unstructured":"M. Wickerhauser . Adapted Wavelet Analysis from Theory to Software. A. K . Peters , Wellesley, MA , 1994 . M. Wickerhauser. Adapted Wavelet Analysis from Theory to Software. A. K. Peters, Wellesley, MA, 1994."}],"event":{"name":"GECCO05: Genetic and Evolutionary Computation Conference","location":"Washington DC USA","acronym":"GECCO05","sponsor":["SIGEVO ACM Special Interest Group on Genetic and Evolutionary Computation","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 7th annual conference on Genetic and evolutionary computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1068009.1068338","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1068009.1068338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:04Z","timestamp":1750262884000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1068009.1068338"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6,25]]},"references-count":26,"alternative-id":["10.1145\/1068009.1068338","10.1145\/1068009"],"URL":"https:\/\/doi.org\/10.1145\/1068009.1068338","relation":{},"subject":[],"published":{"date-parts":[[2005,6,25]]},"assertion":[{"value":"2005-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}