Sciweavers

213 search results - page 9 / 43
» An LSB Data Hiding Technique Using Natural Numbers
Sort
View
ACIIDS
2009
IEEE
144views Database» more  ACIIDS 2009»
14 years 3 months ago
Processing Exact Results for Sliding Window Joins over Time-Sequence, Streaming Data Using a Disk Archive
— We consider the problem of processing exact results for sliding window joins over data streams with limited memory. Existing approaches deal with memory limitations by shedding...
Abhirup Chakraborty, Ajit Singh
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 2 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
BMCBI
2004
174views more  BMCBI 2004»
13 years 10 months ago
SeeGH - A software tool for visualization of whole genome array comparative genomic hybridization data
Background: Array comparative genomic hybridization (CGH) is a technique which detects copy number differences in DNA segments. Complete sequencing of the human genome and the dev...
Bryan Chi, Ronald J. deLeeuw, Bradley P. Coe, Calu...
ICIP
2009
IEEE
13 years 8 months ago
Colour saliency-based parameter optimisation for adaptive colour segmentation
In this paper we present a parameter optimisation procedure that is designed to automatically initialise the number of clusters and the initial colour prototypes required by data ...
Dana Elena Ilea, Paul F. Whelan
INFOSCALE
2007
ACM
14 years 8 days ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü