Sciweavers

38 search results - page 8 / 8
» Effective and scalable video copy detection
Sort
View
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
14 years 5 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
SIGSOFT
2010
ACM
12 years 11 months ago
Path-based fault correlations
Although a number of automatic tools have been developed to detect faults, much of the diagnosis is still being done manually. To help with the diagnostic tasks, we formally intro...
Wei Le, Mary Lou Soffa
MSE
2002
IEEE
198views Hardware» more  MSE 2002»
13 years 9 months ago
BSS: A New Approach for Watermark Attack
Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multi...
Jiang Du, Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho...