Sciweavers

1123 search results - page 56 / 225
» Analysis of Timed Processes with Data Using Algebraic Transf...
Sort
View
ICIP
2008
IEEE
16 years 4 months ago
Estimation of optimum coding redundancy and frequency domain analysis of attacks for YASS - a randomized block based hiding sche
Our recently introduced JPEG steganographic method called Yet Another Steganographic Scheme (YASS) can resist blind steganalysis by embedding data in the discrete cosine transform...
Anindya Sarkar, Lakshmanan Nataraj, B. S. Manjunat...
APVIS
2008
15 years 4 months ago
Interactive Storyboard for Overall Time-Varying Data Visualization
Large amounts of time-varying datasets create great challenges for users to understand and explore them. This paper proposes an efficient visualization method for observing overal...
Aidong Lu, Han-Wei Shen
TSMC
2008
89views more  TSMC 2008»
15 years 3 months ago
A Probabilistic Wavelet System for Stochastic and Incomplete Data-Based Modeling
A probabilistic wavelet system (PWS) is proposed to model the unknown dynamic system with stochastic and incomplete data. When compared with the traditional wavelet system, the PWS...
Zhi Liu, Han-Xiong Li, Yun Zhang
BTW
2005
Springer
125views Database» more  BTW 2005»
15 years 8 months ago
Web Data Extraction for Business Intelligence: The Lixto Approach
: Knowledge about market developments and competitor activities on the market becomes more and more a critical success factor for enterprises. The World Wide Web provides public do...
Georg Gottlob
TIT
2010
61views Education» more  TIT 2010»
14 years 9 months ago
Tunstall code, Khodak variations, and random walks
A variable-to-fixed length encoder partitions the source string into variable-length phrases that belong to a given and fixed dictionary. Tunstall, and independently Khodak, desig...
Michael Drmota, Yuriy A. Reznik, Wojciech Szpankow...