Sciweavers

880 search results - page 137 / 176
» Looking at data
Sort
View
CN
2010
112views more  CN 2010»
14 years 7 months ago
An Internet without the Internet protocol
The growth of the Internet has brought about many challenges for its critical infrastructure. The DNS infrastructure, which translates mnemonic host names into IP addresses unders...
Craig A. Shue, Minaxi Gupta
IJACTAICIT
2010
361views more  IJACTAICIT 2010»
14 years 7 months ago
A Proposed Technique for Information Hiding Based on DCT
The aim of this work is to design an algorithm which combines between steganography and cryptography that can hide a text in an image in a way that prevents, as much as possible, ...
Fadhil Salman Abed, Nada Abdul Aziz Mustafa
ACCV
2010
Springer
14 years 4 months ago
A Weak Structure Model for Regular Pattern Recognition Applied to Facade Images
Abstract. We propose a novel method for recognition of structured images and demonstrate it on detection of windows in facade images. Given an ability to obtain local low-level dat...
Radim Tylecek, Radim Sára
PAMI
2011
14 years 4 months ago
Overcoming Shadows in 3-Source Photometric Stereo
—Light occlusions are one of the most significant difficulties of photometric stereo methods. When three or more images are available without occlusion, the local surface orien...
Carlos Hernández, George Vogiatzis, Roberto...
BCB
2010
175views Bioinformatics» more  BCB 2010»
14 years 4 months ago
Gene set analysis using principal components
We present a new method for identifying gene sets associated with labeled samples, where the labels can be case versus control, or genotype differences. Existing approaches to thi...
Isa Kemal Pakatci, Wei Wang, Leonard McMillan