Sciweavers

4466 search results - page 840 / 894
» Large-Scale Data Analysis Using Heuristic Methods
Sort
View
WSDM
2012
ACM
300views Data Mining» more  WSDM 2012»
13 years 7 months ago
Adding semantics to microblog posts
Microblogs have become an important source of information for the purpose of marketing, intelligence, and reputation management. Streams of microblogs are of great value because o...
Edgar Meij, Wouter Weerkamp, Maarten de Rijke
IBPRIA
2007
Springer
15 years 6 months ago
Optimally Discriminant Moments for Speckle Detection in Real B-Scan Images
Detection of speckle in ultrasound (US) images has been regarded as an important research topic in US imaging, mainly focusing on two specific applications: improving signal to no...
Robert Marti, Joan Martí, Jordi Freixenet, ...
IMSCCS
2006
IEEE
15 years 5 months ago
Frequency Distribution of TATA Box and Extension Sequences on Human Promoters
Background: TATA box is one of the most important transcription factor binding sites. But the exact sequences of TATA box are still not very clear. Results: In this study, we cond...
Wei Shi, Wanlei Zhou
PET
2005
Springer
15 years 5 months ago
Privacy Vulnerabilities in Encrypted HTTP Streams
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...
TIFS
2008
148views more  TIFS 2008»
14 years 11 months ago
Digital Image Forensics via Intrinsic Fingerprints
Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity a...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu