Sciweavers

1296 search results - page 58 / 260
» Multiplicative Background Risk
Sort
View
83
Voted
ICPR
2004
IEEE
16 years 1 months ago
Prioritized Region of Interest Coding in JPEG2000
A method is proposed to encode multiple regions of interest in the JPEG2000 image-coding framework. The algorithm is based on the rearrangement of packets in the code-stream to pl...
Victor Sanchez, Anup Basu, Mrinal K. Mandal
110
Voted
ISMAR
2003
IEEE
15 years 5 months ago
Multiview Paraperspective Projection Model for Diminished Reality
This paper introduces a ”Diminished Reality” technique for removing an object or collection of objects and replacing it with an appropriate background image. Diminished Realit...
Siavash Zokai, Julien Esteve, Yakup Genc, Nassir N...
125
Voted
INFORMATICASI
2010
14 years 9 months ago
Strategic Modeling of Information Sharing among Data Privacy Attackers
Research in privacy-preserving data publishing has revealed the necessity of accounting for an adversary's background knowledge when reasoning about the protection afforded b...
Quang Duong, Kristen LeFevre, Michael P. Wellman
87
Voted
BMCBI
2010
96views more  BMCBI 2010»
15 years 20 days ago
Incorporating gene co-expression network in identification of cancer prognosis markers
Background: Extensive biomedical studies have shown that clinical and environmental risk factors may not have sufficient predictive power for cancer prognosis. The development of ...
Shuangge Ma, Mingyu Shi, Yang Li, Danhui Yi, Ben-C...
111
Voted
IJNSEC
2011
106views more  IJNSEC 2011»
14 years 7 months ago
Elliptic Curve Cryptosystems and Side-channel Attacks
In this paper, we present a background on elliptic curve cryptosystems (ECCs) along with the different methods used to compute the scalar multiplication (ECSM), which is the core...
Ekambaram Kesavulu Reddy