Sciweavers

1997 search results - page 6 / 400
» A Model for Data Leakage Detection
Sort
View
TKDE
2008
137views more  TKDE 2008»
14 years 11 months ago
Nonthreshold-Based Event Detection for 3D Environment Monitoring in Sensor Networks
Event detection is a crucial task for wireless sensor network applications, especially environment monitoring. Existing approaches for event detection are mainly based on some pred...
Mo Li, Yunhao Liu, Lei Chen 0002
JVCIR
2010
180views more  JVCIR 2010»
14 years 10 months ago
Geometric attraction-driven flow for image segmentation and boundary detection
Noble forces in image segmentation based on active contours models are proposed for capturing objects in the image. Contemplating the common functionality of forces in previous ac...
Jooyoung Hahn, Chang-Ock Lee
CISS
2007
IEEE
15 years 6 months ago
Towards Optimal Design of Data Hiding Algorithms Against Nonparametric Adversary Models
Abstract—This paper presents a novel zero-sum watermarking game between a detection algorithm and a data hiding adversary. Contrary to previous research, the detection algorithm ...
Alvaro A. Cárdenas, George V. Moustakides, ...
ACCV
2006
Springer
15 years 5 months ago
Minimal Weighted Local Variance as Edge Detector for Active Contour Models
Performing segmentation of narrow, elongated structures with low contrast boundaries is a challenging problem. Boundaries of these structures are difficult to be located when noise...
Max W. K. Law, Albert C. S. Chung
CORR
2010
Springer
61views Education» more  CORR 2010»
14 years 11 months ago
Utility and Privacy of Data Sources: Can Shannon Help Conceal and Reveal Information?
Abstract-- The problem of private information "leakage" (inadvertently or by malicious design) from the myriad large centralized searchable data repositories drives the n...
Lalitha Sankar, S. Raj Rajagopalan, H. Vincent Poo...