Sciweavers

1407 search results - page 81 / 282
» Cognition without content
Sort
View
CAIVD
1998
110views more  CAIVD 1998»
15 years 2 months ago
Video Skimming and Characterization through the Combination of Image and Language Understanding
Digital video is rapidly becoming important for education, entertainment, and a host of multimedia applications. With the size of the video collections growing to thousands of hou...
Michael A. Smith, Takeo Kanade
IEEEIAS
2007
IEEE
15 years 7 months ago
Protection of Mammograms Using Blind Steganography and Watermarking
As medical image databases are connected together through PACS, those medical images may suffer from security breaches if not protected. If a medical image is illegally obtained o...
Yue Li, Chang-Tsun Li, Chia-Hung Wei
109
Voted
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
15 years 4 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
IEEEHPCS
2010
14 years 11 months ago
Transactional Memory: How to perform load adaption in a simple and distributed manner
We analyze and present different strategies to adapt the load in transactional memory systems based on contention. Our experimental results show a substantial overall improvement ...
David Hasenfratz, Johannes Schneider, Roger Watten...
WABI
2010
Springer
160views Bioinformatics» more  WABI 2010»
14 years 11 months ago
Genomic Distance with DCJ and Indels
The double cut and join (DCJ) operation, introduced by Yancopoulos, Attie and Friedberg in 2005, allows one to represent most rearrangement events in genomes. However, a DCJ cannot...
Marília D. V. Braga, Eyla Willing, Jens Sto...