Sciweavers

926 search results - page 154 / 186
» An Approach for Extracting Workflows from E-Commerce Applica...
Sort
View
145
Voted
ICDS
2010
IEEE
15 years 8 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
81
Voted
SAC
2010
ACM
15 years 8 months ago
A generative pattern model for mining binary datasets
In many application fields, huge binary datasets modeling real life-phenomena are daily produced. The dataset records are usually associated with observations of some events, and...
Claudio Lucchese, Salvatore Orlando, Raffaele Pere...
115
Voted
ICC
2009
IEEE
182views Communications» more  ICC 2009»
15 years 8 months ago
Content Clustering Based Video Quality Prediction Model for MPEG4 Video Streaming over Wireless Networks
— The aim of this paper is quality prediction for streaming MPEG4 video sequences over wireless networks for all video content types. Video content has an impact on video quality...
Asiya Khan, Lingfen Sun, Emmanuel C. Ifeachor
IEEECGIV
2009
IEEE
15 years 8 months ago
Surface Mesh Segmentation Using Local Geometry
—We present a novel algorithm to segment a 3D surface mesh into visually meaningful regions. Our approach is based on an analysis of the local geometry of vertices. In particular...
Chansophea Chuon, Sumanta Guha
CIKM
2009
Springer
15 years 8 months ago
Automatic retrieval of similar content using search engine query interface
We consider the coverage testing problem where we are given a document and a corpus with a limited query interface and asked to find if the corpus contains a near-duplicate of th...
Ali Dasdan, Paolo D'Alberto, Santanu Kolay, Chris ...