Sciweavers

13476 search results - page 2566 / 2696
» Learning from Streams
Sort
View
130
Voted
IWDW
2007
Springer
15 years 10 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
139
Voted
BIBE
2006
IEEE
138views Bioinformatics» more  BIBE 2006»
15 years 10 months ago
Assigning Schema Labels Using Ontology And Hueristics
Bioinformatics data is growing at a phenomenal rate. Besides the exponential growth of individual databases, the number of data depositories is increasing too. Because of the comp...
Xuan Zhang, Ruoming Jin, Gagan Agrawal
IROS
2006
IEEE
159views Robotics» more  IROS 2006»
15 years 10 months ago
Multi-Level Surface Maps for Outdoor Terrain Mapping and Loop Closing
— To operate outdoors or on non-flat surfaces, mobile robots need appropriate data structures that provide a compact representation of the environment and at the same time suppo...
Rudolph Triebel, Patrick Pfaff, Wolfram Burgard
SKG
2006
IEEE
15 years 10 months ago
Mathematics Computing Environment on the Web
With the rapid evolution of web technology and Internet, the mathematical web has emerged as a new research trend, which changes the traditional manner of mathematical scientific ...
Li Liu, Yi Yang, Lian Li
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
15 years 10 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
« Prev « First page 2566 / 2696 Last » Next »