Sciweavers

16513 search results - page 2978 / 3303
» Numerical Analysis Methods
Sort
View
CSREASAM
2006
15 years 6 months ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
ECIR
2004
Springer
15 years 6 months ago
NNk Networks for Content-Based Image Retrieval
Abstract. This paper describes a novel interaction technique to support content-based image search in large image collections. The idea is to represent each image as a vertex in a ...
Daniel Heesch, Stefan M. Rüger
ECIS
2004
15 years 6 months ago
Business alignment in the CRM domain: predicting CRM performance
In this paper we present a framework that aims to answer the central question why some organizations are successful in the CRM domain, while others are not. The framework is built...
Ronald Batenburg, Johan Versendaal
DIMVA
2006
15 years 6 months ago
Network-Level Polymorphic Shellcode Detection Using Emulation
Abstract. As state-of-the-art attack detection technology becomes more prevalent, attackers are likely to evolve, employing techniques such as polymorphism and metamorphism to evad...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
DMIN
2006
157views Data Mining» more  DMIN 2006»
15 years 6 months ago
Data Mining of Air Traffic Control Operational Errors
In this paper we present the results of applying data mining techniques to identify patterns and anomalies in air traffic control operational errors (OEs). Reducing the OE rate is ...
Zohreh Nazeri
« Prev « First page 2978 / 3303 Last » Next »