Sciweavers

2259 search results - page 256 / 452
» Separation and information hiding
Sort
View
97
Voted
IJDAR
2008
121views more  IJDAR 2008»
15 years 23 days ago
Partial discriminative training for classification of overlapping classes in document analysis
For character recognition in document analysis, some classes are closely overlapped but are not necessarily to be separated before contextual information is exploited. For classifi...
Cheng-Lin Liu
108
Voted
IJISEC
2008
92views more  IJISEC 2008»
15 years 23 days ago
A coding approach to the multicast stream authentication problem
We study the multicast stream authentication problem when an opponent can drop, reorder and introduce data packets into the communication channel. In such a model, packet overhead...
Christophe Tartary, Huaxiong Wang, Josef Pieprzyk
100
Voted
IJON
2008
114views more  IJON 2008»
15 years 23 days ago
A robust model for spatiotemporal dependencies
Real-world data sets such as recordings from functional magnetic resonance imaging often possess both spatial and temporal structure. Here, we propose an algorithm including such ...
Fabian J. Theis, Peter Gruber, Ingo R. Keck, Elmar...
COLING
2007
15 years 22 days ago
Answering Clinical Questions with Knowledge-Based and Statistical Techniques
cally identifying clinically relevant aspects of MEDLINE abstracts. These extracted elements serve as the input to an algorithm that scores the relevance of citations with respect ...
Dina Demner-Fushman, Jimmy J. Lin
107
Voted
IJSNET
2006
133views more  IJSNET 2006»
15 years 22 days ago
On the hop count statistics for randomly deployed wireless sensor networks
: In this paper we focus on exploiting the information provided by a generally accepted and largely ignored hypothesis (the random deployment of the nodes of an ad hoc or wireless ...
Stefan Dulman, Michele Rossi, Paul J. M. Havinga, ...