Sciweavers

6329 search results - page 1131 / 1266
» Detection of Stochastic Processes
Sort
View
ARTCOM
2009
IEEE
15 years 10 months ago
Text Fusion Watermarking in Medical Image with Semi-reversible for Secure Transfer and Authentication
Nowadays, the transmission of digitized medical information has become very convenient due to the generality of Internet. Internet has created the biggest benefit to achieve the tr...
P. Viswanathan, P. Venkata Krishna
ACIIDS
2010
IEEE
172views Database» more  ACIIDS 2010»
15 years 10 months ago
Automatic Lexical Annotation Applied to the SCARLET Ontology Matcher
This paper proposes lexical annotation as an effective method to solve the ambiguity problems that affect ontology matchers. Lexical annotation associates to each ontology elemen...
Laura Po, Sonia Bergamaschi
AINA
2010
IEEE
15 years 10 months ago
CAPTCHA Using Strangeness in Machine Translation
— CAPTCHA is a technique that is used to prevent automatic programs from being able to acquire free e-mail or online service accounts. However, as many researchers have already r...
Takumi Yamamoto, J. Doug Tygar, Masakatsu Nishigak...
ACSAC
2002
IEEE
15 years 10 months ago
Architectures for Intrusion Tolerant Database Systems
In this paper, we propose four architectures for intrusion-tolerant database systems. While traditional secure database systems rely on prevention controls, an intrusion-tolerant ...
Peng Liu
CSB
2002
IEEE
121views Bioinformatics» more  CSB 2002»
15 years 10 months ago
Fast and Sensitive Algorithm for Aligning ESTs to Human Genome
There is a pressing need to align growing set of expressed sequence tags (ESTs) to newly sequenced human genome. The problem is, however, complicated by the exon/intron structure ...
Jun Ogasawara, Shinichi Morishita
« Prev « First page 1131 / 1266 Last » Next »