Sciweavers

29 search results - page 5 / 6
» Intrusive and non-intrusive watermarking
Sort
View
CN
2010
110views more  CN 2010»
13 years 6 months ago
End-to-end quality of service seen by applications: A statistical learning approach
The focus of this work is on the estimation of quality of service (QoS) parameters seen by an application. Our proposal is based on end-to-end active measurements and statistical ...
Pablo Belzarena, Laura Aspirot
ICIP
2002
IEEE
14 years 7 months ago
Intrusive and non-intrusive watermarking
"Can we watermark without perturbing an image?" We present the salient results of the investigationcarried out to find an answer to this question.
V. J. Hari Krishna, K. R. Ramakrishnan
SEC
2001
13 years 7 months ago
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework
Xinyuan Wang, Douglas S. Reeves, Shyhtsun Felix Wu...
WWW
2005
ACM
14 years 6 months ago
A personalized search engine based on web-snippet hierarchical clustering
In this paper we propose a hierarchical clustering engine, called SnakeT, that is able to organize on-the-fly the search results drawn from 16 commodity search engines into a hier...
Paolo Ferragina, Antonio Gulli
BMCBI
2008
115views more  BMCBI 2008»
13 years 6 months ago
Systems biology driven software design for the research enterprise
Background: In systems biology, and many other areas of research, there is a need for the interoperability of tools and data sources that were not originally designed to be integr...
John Boyle, Christopher C. Cavnor, Sarah A. Killco...