Sciweavers

3072 search results - page 326 / 615
» Shape analysis algorithm based on information theory
Sort
View
131
Voted
IH
2007
Springer
15 years 10 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
PAMI
2008
166views more  PAMI 2008»
15 years 4 months ago
Coarse-to-Fine Segmentation and Tracking Using Sobolev Active Contours
Recently proposed Sobolev active contours introduced a new paradigm for minimizing energies defined on curves by changing the traditional cost of perturbing a curve and thereby red...
Ganesh Sundaramoorthi, Anthony J. Yezzi, Andrea Me...
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
16 years 1 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
DASFAA
2007
IEEE
159views Database» more  DASFAA 2007»
15 years 10 months ago
Mining Vague Association Rules
In many online shopping applications, traditional Association Rule (AR) mining has limitations as it only deals with the items that are sold but ignores the items that are almost s...
An Lu, Yiping Ke, James Cheng, Wilfred Ng
122
Voted
SEMWEB
2009
Springer
15 years 10 months ago
Functions over RDF Language Elements
Spreadsheet tools are often used in business and private scenarios in order to collect and store data, and to explore and analyze these data by executing functions and aggregation...
Bernhard Schandl