Sciweavers

1737 search results - page 149 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
WISA
2007
Springer
15 years 11 months ago
Geometrically Invariant Image Watermarking in the DWT Domain
Watermark resistance to both geometric attacks and lossy compressions is a fundamental issue in the image watermarking community. In this paper, we propose a DWT (Discrete Wavelet ...
Shijun Xiang, Hyoung-Joong Kim
APSEC
2001
IEEE
15 years 8 months ago
A Framework for Migrating Procedural Code to Object-Oriented Platforms
With the rapid growth of the Internet and pervasive computing activities, the migration of back-end legacy systems to network centric environments has become a focal point for res...
Ying Zou, Kostas Kontogiannis
CAIP
2009
Springer
114views Image Analysis» more  CAIP 2009»
15 years 8 months ago
Decision Trees Using the Minimum Entropy-of-Error Principle
Binary decision trees based on univariate splits have traditionally employed so-called impurity functions as a means of searching for the best node splits. Such functions use estim...
Joaquim Marques de Sá, João Gama, Ra...
CCS
2007
ACM
15 years 11 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
HICSS
2007
IEEE
116views Biometrics» more  HICSS 2007»
15 years 11 months ago
Modeling Network Decisions under Uncertainty: Countervailing Externalities and Embedded Options
The analysis of externalities in technology-based networks continues to be of significant managerial importance in e-commerce and traditional IS operations. Competitive strategy, ...
Robert J. Kauffman, Ajay Kumar