Sciweavers

17450 search results - page 242 / 3490
» Numerical Methods with Applications
Sort
View
ICIP
2005
IEEE
16 years 5 months ago
Statistical restoration for robust and secure steganography
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover. The approach is to rese...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
135
Voted
EDBT
2008
ACM
166views Database» more  EDBT 2008»
16 years 3 months ago
A novel spectral coding in a large graph database
Retrieving related graphs containing a query graph from a large graph database is a key issue in many graph-based applications, such as drug discovery and structural pattern recog...
Lei Zou, Lei Chen 0002, Jeffrey Xu Yu, Yansheng Lu
ICRA
2009
IEEE
170views Robotics» more  ICRA 2009»
15 years 10 months ago
Automatic high-precision self-calibration of camera-robot systems
— In this article a new method is presented to obtain a full and precise calibration of camera-robot systems with eyein-hand cameras. It achieves a simultaneous and numerically s...
Andreas Jordt, Nils T. Siebel, Gerald Sommer
ACSC
2006
IEEE
15 years 9 months ago
A framework for visual data mining of structures
Visual data mining has been established to effectively analyze large, complex numerical data sets. Especially, the extraction and visualization of inherent structures such as hie...
Hans-Jörg Schulz, Thomas Nocke, Heidrun Schum...
106
Voted
IJCNN
2006
IEEE
15 years 9 months ago
In Situ Training of CMOL CrossNets
—— Hybrid semiconductor/nanodevice (“CMOL”) technology may allow the implementation of digital and mixed-signal integrated circuits, including artificial neural networks (...
Jung Hoon Lee, Konstantin Likharev