Sciweavers

1296 search results - page 58 / 260
» Multiplicative Background Risk
Sort
View
ICPR
2004
IEEE
16 years 5 months ago
Prioritized Region of Interest Coding in JPEG2000
A method is proposed to encode multiple regions of interest in the JPEG2000 image-coding framework. The algorithm is based on the rearrangement of packets in the code-stream to pl...
Victor Sanchez, Anup Basu, Mrinal K. Mandal
ISMAR
2003
IEEE
15 years 9 months ago
Multiview Paraperspective Projection Model for Diminished Reality
This paper introduces a ”Diminished Reality” technique for removing an object or collection of objects and replacing it with an appropriate background image. Diminished Realit...
Siavash Zokai, Julien Esteve, Yakup Genc, Nassir N...
INFORMATICASI
2010
15 years 1 months ago
Strategic Modeling of Information Sharing among Data Privacy Attackers
Research in privacy-preserving data publishing has revealed the necessity of accounting for an adversary's background knowledge when reasoning about the protection afforded b...
Quang Duong, Kristen LeFevre, Michael P. Wellman
BMCBI
2010
96views more  BMCBI 2010»
15 years 4 months ago
Incorporating gene co-expression network in identification of cancer prognosis markers
Background: Extensive biomedical studies have shown that clinical and environmental risk factors may not have sufficient predictive power for cancer prognosis. The development of ...
Shuangge Ma, Mingyu Shi, Yang Li, Danhui Yi, Ben-C...
IJNSEC
2011
106views more  IJNSEC 2011»
14 years 11 months ago
Elliptic Curve Cryptosystems and Side-channel Attacks
In this paper, we present a background on elliptic curve cryptosystems (ECCs) along with the different methods used to compute the scalar multiplication (ECSM), which is the core...
Ekambaram Kesavulu Reddy