Sciweavers

1522 search results - page 172 / 305
» Practical Exception Specifications
Sort
View
SAC
2008
ACM
15 years 1 months ago
Digital audio watermarking evaluation within the application field of perceptual hashing
Digital watermarking is a growing research area to mark digital content by embedding information into the content itself. Perceptual hashing is used to identify a specific content...
Andreas Lang, Jana Dittmann
AI
2003
Springer
15 years 7 months ago
Negotiating Exchanges of Private Information for Web Service Eligibility
Private information about individuals that engage in e-commerce business transactions is of economic value to businesses for market analysis and for identifying possible future par...
Keping Jia, Bruce Spencer
ICCAD
1999
IEEE
86views Hardware» more  ICCAD 1999»
15 years 6 months ago
Clock skew scheduling for improved reliability via quadratic programming
This paper considers the problem of determining an optimal clock skew schedule for a synchronous VLSI circuit. A novel formulation of clock skew scheduling as a constrained quadrat...
Ivan S. Kourtev, Eby G. Friedman
NIPS
2008
15 years 3 months ago
On the Reliability of Clustering Stability in the Large Sample Regime
Clustering stability is an increasingly popular family of methods for performing model selection in data clustering. The basic idea is that the chosen model should be stable under...
Ohad Shamir, Naftali Tishby
DMIN
2006
131views Data Mining» more  DMIN 2006»
15 years 3 months ago
Use of Data Mining to Determine Cheating in Online Student Assessment
are proposing a model to help organizations detect and prevent cheats in online assessments. First we analyze different student personalities, stress situations generated by onlin...
Alberto Ochoa, Amol Wagholikar