Sciweavers

29147 search results - page 5744 / 5830
» System Modeling Resurrected
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 4 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
MOBICOM
2006
ACM
15 years 4 months ago
Boundary recognition in sensor networks by topological methods
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to bot...
Yue Wang, Jie Gao, Joseph S. B. Mitchell
PPPJ
2006
ACM
15 years 4 months ago
Juxta-Cat: a JXTA-based platform for distributed computing
In this paper we present a JXTA-based platform, called Juxta-CAT, which is an effort to use the JXTA architecture to build a job execution-sharing distributed environment. The Ju...
Joan Esteve Riasol, Fatos Xhafa
SAC
2006
ACM
15 years 4 months ago
The impact of sample reduction on PCA-based feature extraction for supervised learning
“The curse of dimensionality” is pertinent to many learning algorithms, and it denotes the drastic raise of computational complexity and classification error in high dimension...
Mykola Pechenizkiy, Seppo Puuronen, Alexey Tsymbal
SAC
2006
ACM
15 years 4 months ago
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data
Traditional Data Mining and Knowledge Discovery algorithms assume free access to data, either at a centralized location or in federated form. Increasingly, privacy and security co...
Hwanjo Yu, Xiaoqian Jiang, Jaideep Vaidya
« Prev « First page 5744 / 5830 Last » Next »