Sciweavers

8087 search results - page 1418 / 1618
» Meta Data Management
Sort
View
COOPIS
1997
IEEE
15 years 8 months ago
Semi-Automatic Wrapper Generation for Internet Information Sources
To simplify the task of obtaining information from the vast number of information sources that are available on the World Wide Web (WWW), we are building tools to build informatio...
Naveen Ashish, Craig A. Knoblock
IH
1998
Springer
15 years 8 months ago
The Steganographic File System
Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Ross J. Anderson, Roger M. Needham, Adi Shamir
IH
1998
Springer
15 years 8 months ago
Secure Copyright Protection Techniques for Digital Images
This paper2 presents a new approach for the secure and robust copyright protection of digital images. A system for generating digital watermarks and for trading watermarked images ...
Alexander Herrigel, Joseph Ó Ruanaidh, Holg...
IH
1998
Springer
15 years 8 months ago
Modelling the False Alarm and Missed Detection Rate for Electronic Watermarks
Theoretical modeling of watermarks allow prediction of the detector reliability and facilitates the development of more reliable systems. In particular, mathematical evaluation is ...
Jean-Paul M. G. Linnartz, Ton Kalker, Geert Depove...
KES
1998
Springer
15 years 8 months ago
An acquisition of the relation between vision and action using self-organizing map and reinforcement learning
An agent must acquire internal representation appropriate for its task, environment, sensors. As a learning algorithm, reinforcement learning is often utilized to acquire the rela...
Kazunori Terada, Hideaki Takeda, Toyoaki Nishida
« Prev « First page 1418 / 1618 Last » Next »