Sciweavers

213 search results - page 20 / 43
» An LSB Data Hiding Technique Using Natural Numbers
Sort
View
JSAC
2007
87views more  JSAC 2007»
13 years 10 months ago
Performance Analysis of Scheduling in Multiuser MIMO Systems with Zero-Forcing Receivers
— Despite its low-complexity, the zero-forcing receiver is known to suffer from noise enhancement to restore the spatially multiplexed data in a single-user MIMO system. Neverthe...
Chiung-Jang Chen, Li-Chun Wang
ISVC
2007
Springer
14 years 4 months ago
Automatic Image Representation for Content-Based Access to Personal Photo Album
Abstract. The proposed work exploits methods and techniques for automatic characterization of images for content-based access to personal photo libraries. Several techniques, even ...
Edoardo Ardizzone, Marco La Cascia, Filippo Vella
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
15 years 1 hour ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
MICCAI
2000
Springer
14 years 2 months ago
Generalized Correlation Ratio for Rigid Registration of 3D Ultrasound with MR Images
Abstract. Automatic processing of 3D ultrasound (US) is of great interest for the development of innovative and low-cost computer-assisted surgery tools. In this paper, we present ...
Alexis Roche, Xavier Pennec, Michael Rudolph, Doro...
VTC
2010
IEEE
185views Communications» more  VTC 2010»
13 years 8 months ago
Fuzzy Logic Aided Dynamic Source Routing in Cross-Layer Operation Assisted Ad Hoc Networks
1The classic Dynamic Source Routing (DSR) protocol opts for the route requiring the lowest number of hops for transmitting data from the source to the destination. However, owing t...
Jing Zuo, Soon Xin Ng, Lajos Hanzo