Sciweavers

319 search results - page 41 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
SIBGRAPI
2006
IEEE
15 years 3 months ago
Increasing statistical power in medical image analysis
In this paper, we present a novel method for estimating the effective number of independent variables in imaging applications that require multiple hypothesis testing. The method ...
Alexei Manso Correa Machado
AAECC
2006
Springer
114views Algorithms» more  AAECC 2006»
15 years 3 months ago
Traitor Tracing Against Powerful Attacks Using Combinatorial Designs
This paper addresses the problem of threshold traitor tracing for digital content where, by embedding appropriate digital patterns into the distributed content, it is possible to t...
Simon McNicol, Serdar Boztas, Asha Rao
SIGECOM
2006
ACM
115views ECommerce» more  SIGECOM 2006»
15 years 3 months ago
Multi-attribute coalitional games
We study coalitional games where the value of cooperation among the agents are solely determined by the attributes the agents possess, with no assumption as to how these attribute...
Samuel Ieong, Yoav Shoham
62
Voted
HICSS
2005
IEEE
329views Biometrics» more  HICSS 2005»
15 years 3 months ago
A Framework for Evaluating Strategic Location-Based Applications in Businesses
Location-based and location-oriented applications will be amongst the most powerful drivers of organizational change in the coming years. However, the strategic use of these techn...
François Bergeron, Lin Gingras, Pierre Hada...
IWPSE
2005
IEEE
15 years 3 months ago
Evolving Evolution
Software is changing and software evolution is going to change with it. In considering software and the problems of software evolution today we make the tacit assumption that we c...
Steven P. Reiss