Sciweavers

106 search results - page 9 / 22
» A Trust Model with Statistical Foundation
Sort
View
GLVLSI
2010
IEEE
190views VLSI» more  GLVLSI 2010»
14 years 11 months ago
A linear statistical analysis for full-chip leakage power with spatial correlation
In this paper, we present an approved linear-time algorithm for statistical leakage analysis in the present of any spatial correlation condition (strong or weak). The new algorith...
Ruijing Shen, Sheldon X.-D. Tan, Jinjun Xiong
82
Voted
IJNSEC
2007
96views more  IJNSEC 2007»
14 years 9 months ago
Research on Data Hiding Capacity
To hide data in credentials is a key problem in information security. In this paper, a summary of the work on data hiding-capacity is made and several communication channel models...
Zhensong Liao, Yan Huang, Chisong Li
SIGIR
1999
ACM
15 years 1 months ago
Probabilistic Latent Semantic Indexing
Probabilistic Latent Semantic Indexing is a novel approach to automated document indexing which is based on a statistical latent class model for factor analysis of count data. Fit...
Thomas Hofmann
ICIAP
2007
ACM
15 years 9 months ago
A Consistency Result for the Normalized Eight-Point Algorithm
A recently proposed argument to explain the improved performance of the eight-point algorithm that results from using normalized data [IEEE Trans. Pattern Anal. Mach. Intell., 25(...
Wojciech Chojnacki, Michael J. Brooks
JMIV
2007
158views more  JMIV 2007»
14 years 9 months ago
On the Consistency of the Normalized Eight-Point Algorithm
A recently proposed argument to explain the improved performance of the eight-point algorithm that results from using normalized data [IEEE Trans. Pattern Anal. Mach. Intell., 25(9...
Wojciech Chojnacki, Michael J. Brooks