Sciweavers

988 search results - page 103 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ISBI
2006
IEEE
15 years 10 months ago
Automatic registration of mammograms using texture-based anisotropic features
In this paper, an automated registration framework is proposed to identify the differences between corresponding mammographic images. The deformation between a pair of mammograms ...
Kexiang Wang, Hong Qin, Paul R. Fisher, Wei Zhao
SIGCSE
2009
ACM
179views Education» more  SIGCSE 2009»
15 years 10 months ago
Methods, metrics and motivation for a green computer science program
Computer science educators are uniquely positioned to promote greater awareness of Green Computing, using the academic setting to encourage environmentally conscious use of techno...
Mujtaba Talebi, Thomas Way
ICAS
2009
IEEE
147views Robotics» more  ICAS 2009»
15 years 4 months ago
Fast Estimation of Aggregates in Unstructured Networks
Aggregation of data values plays an important role on distributed computations, in particular over peer-to-peer and sensor networks, as it can provide a summary of some global sys...
Carlos Baquero, Paulo Sérgio Almeida, Raque...
CIKM
2009
Springer
15 years 4 months ago
Evaluation of methods for relative comparison of retrieval systems based on clickthroughs
The Cranfield evaluation method has some disadvantages, including its high cost in labor and inadequacy for evaluating interactive retrieval techniques. As a very promising alter...
Jing He, Chengxiang Zhai, Xiaoming Li
IH
2009
Springer
15 years 4 months ago
Microphone Classification Using Fourier Coefficients
Media forensics tries to determine the originating device of a signal. We apply this paradigm to microphone forensics, determining the microphone model used to record a given audio...
Robert Buchholz, Christian Krätzer, Jana Ditt...