Sciweavers

2449 search results - page 307 / 490
» Tensor Embedding Methods
Sort
View
PST
2004
14 years 12 months ago
Syntax-based Vulnerability Testing of Frame-based Network Protocols
Syntax-based vulnerability testing is a static black-box testing method for protocol implementations. It involves testing the Implementation Under Test (IUT) with a large number o...
Oded Tal, Scott Knight, Tom Dean
SDM
2004
SIAM
194views Data Mining» more  SDM 2004»
14 years 12 months ago
Finding Frequent Patterns in a Large Sparse Graph
Graph-based modeling has emerged as a powerful abstraction capable of capturing in a single and unified framework many of the relational, spatial, topological, and other characteri...
Michihiro Kuramochi, George Karypis
IJCAI
2003
14 years 12 months ago
Continuous nonlinear dimensionality reduction by kernel Eigenmaps
We equate nonlinear dimensionality reduction (NLDR) to graph embedding with side information about the vertices, and derive a solution to either problem in the form of a kernel-ba...
Matthew Brand
VCIP
2001
159views Communications» more  VCIP 2001»
14 years 12 months ago
Embedded-to-lossless coding of motion-compensated prediction residuals in lossless video coding
Lossless video coding is useful in applications where no loss of information or visual quality is tolerable. In embedded to lossless coding an encoded video stream can be decoded ...
G. Charith K. Abhayaratne, Donald M. Monro
ICASSP
2010
IEEE
14 years 10 months ago
A novel watermarking scheme with compensation in bit-stream domain for H.264/AVC
Currently, most of the watermarking algorithms for H.264/AVC video coding standard are encoder-based due to their high perceptual quality. However, for the compressed video, they ...
Liwei Zhang, Yuesheng Zhu, Lai-Man Po