Many types of pseudo-random signals have been used to embed signatures as watermarks, with spread spectrum signal techniques used to recover the signature from the encrypted data....
Ron G. van Schyndel, Andrew Z. Tirkel, Imants D. S...
A cascade model is a rule induction methodology using levelwise expansion of an itemset lattice, where the explanatory power of a rule set and its constituent rules are quantitativ...
In this paper we propose a new General Image DataBase (GIDB) model. The model establishes taxonomy based on the systematisation of existing approaches. The GIDB model is based on t...
Abstract. Spoken dialogue interfaces apply in a number of applications. Engaging in meaningful conversation presupposes the ability to recognize and generate different conversatio...
KDD (Knowledge Discovery in Databases) processhas become a new and important research area. Within the framework of KDD process and the GLS (Global Learning Scheme) system recentl...
Ning Zhong, Chunnian Liu, Yoshitsugu Kakemoto, Set...