Sciweavers

988 search results - page 133 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
AMC
2007
134views more  AMC 2007»
14 years 10 months ago
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has...
Shaohui Liu, Hongxun Yao, Wen Gao, Yongliang Liu
DATAMINE
2010
122views more  DATAMINE 2010»
14 years 10 months ago
Three naive Bayes approaches for discrimination-free classification
In this paper, we investigate how to modify the Naive Bayes classifier in order to perform classification that is restricted to be independent with respect to a given sensitive att...
Toon Calders, Sicco Verwer
JIRS
2006
95views more  JIRS 2006»
14 years 9 months ago
Vision-based Target Geo-location using a Fixed-wing Miniature Air Vehicle
This paper presents a method for determining the GPS location of a ground-based object when imaged from a fixed-wing miniature air vehicle (MAV). Using the pixel location of the ta...
D. Blake Barber, Joshua D. Redding, Timothy W. McL...
TIT
2008
101views more  TIT 2008»
14 years 9 months ago
Low-Rate Repeat-Zigzag-Hadamard Codes
In this paper, we propose a new class of low-rate error correction codes called repeat-zigzag-Hadamard (RZH) codes featuring simple encoder and decoder structures, and flexible cod...
Kai Li, Guosen Yue, Xiaodong Wang, Li Ping
COMGEO
2004
ACM
14 years 9 months ago
A multi-dimensional approach to force-directed layouts of large graphs
We present a novel hierarchical force-directed method for drawing large graphs. Given a graph G = (V,E), the algorithm produces an embedding for G in an Euclidean space E of any d...
Pawel Gajer, Michael T. Goodrich, Stephen G. Kobou...