Sciweavers

18374 search results - page 89 / 3675
» Applications for data hiding
Sort
View
HPCA
1997
IEEE
15 years 9 months ago
Design Issues and Tradeoffs for Write Buffers
Processors with write-through caches typically require a write buffer to hide the write latency to the next level of memory hierarchy and to reduce write traffic. A write buffer ...
Kevin Skadron, Douglas W. Clark
METRICS
1996
IEEE
15 years 9 months ago
Evaluating the Impact of Object-Oriented Design on Software Quality
This paper describes the results of a study where the impact of Object-Oriented design on software quality characteristics is experimentally evaluated. A suite of metrics for OO d...
Fernando Brito e Abreu, Walcélio L. Melo
BIBE
2004
IEEE
120views Bioinformatics» more  BIBE 2004»
15 years 9 months ago
Identifying Projected Clusters from Gene Expression Profiles
In microarray gene expression data, clusters may hide in subspaces. Traditional clustering algorithms that make use of similarity measurements in the full input space may fail to ...
Kevin Y. Yip, David W. Cheung, Michael K. Ng, Kei-...
BIOID
2008
101views Biometrics» more  BIOID 2008»
15 years 7 months ago
Template Protection for On-Line Signature-Based Recognition Systems
Abstract. Security and privacy issues are considered as two of the major concerns related to the use of biometric data for authentication purposes. In this paper we propose two dif...
Emanuele Maiorana, Patrizio Campisi, Alessandro Ne...
JDCTA
2008
535views more  JDCTA 2008»
15 years 5 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...