Sciweavers

5990 search results - page 1116 / 1198
» The Sampling Analysis Pattern
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 10 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
KAIS
2006
126views more  KAIS 2006»
14 years 10 months ago
Fast and exact out-of-core and distributed k-means clustering
Clustering has been one of the most widely studied topics in data mining and k-means clustering has been one of the popular clustering algorithms. K-means requires several passes ...
Ruoming Jin, Anjan Goswami, Gagan Agrawal
KES
2006
Springer
14 years 10 months ago
Spiking Neural Network Based Classification of Task-Evoked EEG Signals
This paper presents an improved technique to detect evoked potentials in continuous EEG recordings using a spiking neural network. Human EEG signals recorded during spell checking,...
Piyush Goel, Honghai Liu, David J. Brown, Avijit D...
PAMI
2006
227views more  PAMI 2006»
14 years 10 months ago
Matching 2.5D Face Scans to 3D Models
The performance of face recognition systems that use two-dimensional images depends on factors such as lighting and subject's pose. We are developing a face recognition system...
Xiaoguang Lu, Anil K. Jain, Dirk Colbry
IJDE
2007
123views more  IJDE 2007»
14 years 10 months ago
Identifying Authorship by Byte-Level N-Grams: The Source Code Author Profile (SCAP) Method
Source code author identification deals with identifying the most likely author of a computer program, given a set of predefined author candidates. There are several scenarios whe...
Georgia Frantzeskou, Efstathios Stamatatos, Stefan...
« Prev « First page 1116 / 1198 Last » Next »