Sciweavers

2990 search results - page 572 / 598
» Hidden Markov processes
Sort
View
MSWIM
2009
ACM
15 years 4 months ago
How do wireless chains behave?: the impact of MAC interactions
In a Multi-hop Wireless Networks (MHWN), packets are routed between source and destination using a chain of intermediate nodes; chains are a fundamental communication structure in...
Saquib Razak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...
IWDW
2007
Springer
15 years 3 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
103
Voted
WILF
2007
Springer
170views Fuzzy Logic» more  WILF 2007»
15 years 3 months ago
Time-Series Alignment by Non-negative Multiple Generalized Canonical Correlation Analysis
Background: Quantitative analysis of differential protein expressions requires to align temporal elution measurements from liquid chromatography coupled to mass spectrometry (LC/M...
Bernd Fischer, Volker Roth, Joachim M. Buhmann
WPES
2006
ACM
15 years 3 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
DASFAA
2003
IEEE
99views Database» more  DASFAA 2003»
15 years 3 months ago
Scalable View Expansion in a Peer Mediator System
To integrate many data sources we use a peer mediator framework where views defined in the peers are logically composed in terms of each other. A common approach to execute queri...
Timour Katchaounov, Vanja Josifovski, Tore Risch