Sciweavers

15754 search results - page 3002 / 3151
» Programs are Knowledge Bases
Sort
View
TIP
2010
107views more  TIP 2010»
14 years 11 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
175
Voted
TMI
2010
208views more  TMI 2010»
14 years 11 months ago
Patient-Specific Modeling and Quantification of the Aortic and Mitral Valves From 4-D Cardiac CT and TEE
As decisions in cardiology increasingly rely on non-invasive methods, fast and precise image processing tools have become a crucial component of the analysis workflow. To the best ...
Razvan Ioan Ionasec, Ingmar Voigt, Bogdan Georgesc...
150
Voted
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
14 years 11 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
CORR
2011
Springer
136views Education» more  CORR 2011»
14 years 8 months ago
Eliciting Forecasts from Self-interested Experts: Scoring Rules for Decision Makers
Scoring rules for eliciting expert predictions of random variables are usually developed assuming that experts derive utility only from the quality of their predictions (e.g., sco...
Craig Boutilier
ICDE
2011
IEEE
194views Database» more  ICDE 2011»
14 years 8 months ago
Representative skylines using threshold-based preference distributions
— The study of skylines and their variants has received considerable attention in recent years. Skylines are essentially sets of most interesting (undominated) tuples in a databa...
Atish Das Sarma, Ashwin Lall, Danupon Nanongkai, R...
« Prev « First page 3002 / 3151 Last » Next »