Sciweavers

5344 search results - page 402 / 1069
» Privacy-Preserving Set Operations
Sort
View
JEI
2006
128views more  JEI 2006»
15 years 4 months ago
Performance study of common image steganography and steganalysis techniques
Abstract. We investigate the performance of state of the art universal steganalyzers proposed in the literature. These universal steganalyzers are tested against a number of well-k...
Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
JMLR
2006
134views more  JMLR 2006»
15 years 4 months ago
Considering Cost Asymmetry in Learning Classifiers
Receiver Operating Characteristic (ROC) curves are a standard way to display the performance of a set of binary classifiers for all feasible ratios of the costs associated with fa...
Francis R. Bach, David Heckerman, Eric Horvitz
159
Voted
JMLR
2006
206views more  JMLR 2006»
15 years 4 months ago
New Algorithms for Efficient High-Dimensional Nonparametric Classification
This paper is about non-approximate acceleration of high-dimensional nonparametric operations such as k nearest neighbor classifiers. We attempt to exploit the fact that even if w...
Ting Liu, Andrew W. Moore, Alexander G. Gray
144
Voted
JVCA
2006
140views more  JVCA 2006»
15 years 4 months ago
A fast triangle to triangle intersection test for collision detection
The triangle-to-triangle intersection test is a basic component of all collision detection data structures and algorithms. This paper presents a fast method for testing whether tw...
Oren Tropp, Ayellet Tal, Ilan Shimshoni
152
Voted
TIT
1998
100views more  TIT 1998»
15 years 4 months ago
Block-Coded PSK Modulation Using Two-Level Group Codes Over Dihedral Groups
—A length n group code over a group G is a subgroup of Gn under component-wise group operation. Group codes over dihedral groups DM, with 2M elements, that are two-level construc...
Jyoti Bali, B. Sundar Rajan