Sciweavers

213 search results - page 9 / 43
» An LSB Data Hiding Technique Using Natural Numbers
Sort
View
160
Voted
ACIIDS
2009
IEEE
144views Database» more  ACIIDS 2009»
15 years 8 months ago
Processing Exact Results for Sliding Window Joins over Time-Sequence, Streaming Data Using a Disk Archive
— We consider the problem of processing exact results for sliding window joins over data streams with limited memory. Existing approaches deal with memory limitations by shedding...
Abhirup Chakraborty, Ajit Singh
134
Voted
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 7 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
142
Voted
BMCBI
2004
174views more  BMCBI 2004»
15 years 3 months ago
SeeGH - A software tool for visualization of whole genome array comparative genomic hybridization data
Background: Array comparative genomic hybridization (CGH) is a technique which detects copy number differences in DNA segments. Complete sequencing of the human genome and the dev...
Bryan Chi, Ronald J. deLeeuw, Bradley P. Coe, Calu...
121
Voted
ICIP
2009
IEEE
15 years 1 months ago
Colour saliency-based parameter optimisation for adaptive colour segmentation
In this paper we present a parameter optimisation procedure that is designed to automatically initialise the number of clusters and the initial colour prototypes required by data ...
Dana Elena Ilea, Paul F. Whelan
144
Voted
INFOSCALE
2007
ACM
15 years 5 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü