Sciweavers

9133 search results - page 1470 / 1827
» Modelling perception using image processing algorithms
Sort
View
KDD
2008
ACM
148views Data Mining» more  KDD 2008»
16 years 5 months ago
Get another label? improving data quality and data mining using multiple, noisy labelers
This paper addresses the repeated acquisition of labels for data items when the labeling is imperfect. We examine the improvement (or lack thereof) in data quality via repeated la...
Victor S. Sheng, Foster J. Provost, Panagiotis G. ...
BMCBI
2007
136views more  BMCBI 2007»
15 years 4 months ago
Prediction of tissue-specific cis-regulatory modules using Bayesian networks and regression trees
Background: In vertebrates, a large part of gene transcriptional regulation is operated by cisregulatory modules. These modules are believed to be regulating much of the tissue-sp...
Xiaoyu Chen, Mathieu Blanchette
DRM
2007
Springer
15 years 11 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
MIR
2006
ACM
145views Multimedia» more  MIR 2006»
15 years 10 months ago
Similarity learning via dissimilarity space in CBIR
In this paper, we introduce a new approach to learn dissimilarity for interactive search in content based image retrieval. In literature, dissimilarity is often learned via the fe...
Giang P. Nguyen, Marcel Worring, Arnold W. M. Smeu...
MMSEC
2006
ACM
148views Multimedia» more  MMSEC 2006»
15 years 10 months ago
Minimizing the embedding impact in steganography
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Jessica J. Fridrich
« Prev « First page 1470 / 1827 Last » Next »