Sciweavers

7921 search results - page 1501 / 1585
» LSH-preserving functions and their applications
Sort
View
IH
1999
Springer
15 years 2 months ago
Hiding Signatures in Graph Coloring Solutions
Abstract. One way to protect a digital product is to embed an author's signature into the object in the form of minute errors. However, this technique cannot be directly appli...
Gang Qu, Miodrag Potkonjak
ICCV
1998
IEEE
15 years 2 months ago
Condensing Image Databases when Retrieval is Based on Non-Metric Distances
One of the key problems in appearance-based vision is understanding how to use a set of labeled images to classify new images. Classification systems that can model human performa...
David W. Jacobs, Daphna Weinshall, Yoram Gdalyahu
RECOMB
1999
Springer
15 years 2 months ago
Classifying proteins by family using the product of correlated p-values
An important goal in bioinformatics is determining the homology and function of proteins from their sequences. Pairwise sequence similarity algorithms are often employed for this ...
Timothy L. Bailey, William Noble Grundy
INFOCOM
1998
IEEE
15 years 2 months ago
QoS Routing in Networks with Uncertain Parameters
We consider the problem of routing connections with quality of service (QoS) requirements across networks when the information available for making routing decisions is inaccurate....
Dean H. Lorenz, Ariel Orda
SIGADA
1999
Springer
15 years 2 months ago
Redistribution in distributed Ada
In this paper we will demonstrate how Ada and its Distributed Annex may be used to relocate concurrent objects in a distributed data ow application. This relocation mechanism will...
Scott James
« Prev « First page 1501 / 1585 Last » Next »