Sciweavers

656 search results - page 109 / 132
» Modeling Quality of Information in Multi-sensor Surveillance...
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 3 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
BMCBI
2006
94views more  BMCBI 2006»
14 years 9 months ago
Simulation of microarray data with realistic characteristics
Background: Microarray technologies have become common tools in biological research. As a result, a need for effective computational methods for data analysis has emerged. Numerou...
Matti Nykter, Tommi Aho, Miika Ahdesmäki, Pek...
105
Voted
MM
2010
ACM
219views Multimedia» more  MM 2010»
14 years 9 months ago
A framework for photo-quality assessment and enhancement based on visual aesthetics
We present an interactive application that enables users to improve the visual aesthetics of their digital photographs using spatial recomposition. Unlike earlier work that focuse...
Subhabrata Bhattacharya, Rahul Sukthankar, Mubarak...
PAKDD
2009
ACM
135views Data Mining» more  PAKDD 2009»
15 years 4 months ago
On Mining Rating Dependencies in Online Collaborative Rating Networks
The trend of social information processing sees e-commerce and social web applications increasingly relying on user-generated content, such as rating, to determine the quality of o...
Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang
79
Voted
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
15 years 3 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood