Sciweavers

177 search results - page 29 / 36
» Analysis of recommendation algorithms for e-commerce
Sort
View
MMSEC
2006
ACM
148views Multimedia» more  MMSEC 2006»
14 years 1 months ago
Minimizing the embedding impact in steganography
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Jessica J. Fridrich
ARCS
2004
Springer
14 years 28 days ago
Heterogenous Data Fusion via a Probabilistic Latent-Variable Model
In a pervasive computing environment, one is facing the problem of handling heterogeneous data from different sources, transmitted over heterogeneous channels and presented on het...
Kai Yu, Volker Tresp
NETWORKING
2010
13 years 9 months ago
Measurement Study of Multi-party Video Conferencing
Abstract. More and more free multi-party video conferencing applications are readily available over the Internet and both Server-to-Client (S/C) or Peer-to-Peer (P2P) technologies ...
Yue Lu, Yong Zhao, Fernando A. Kuipers, Piet Van M...
ESWA
2008
166views more  ESWA 2008»
13 years 7 months ago
Modular design to support green life-cycle engineering
The severe competition in the market has driven enterprises to produce a wider variety of products to meet consumers' needs. However, frequent variation of product specificat...
Hwai-En Tseng, Chien-Chen Chang, Jia-Diann Li
AIRWEB
2007
Springer
14 years 1 months ago
A Taxonomy of JavaScript Redirection Spam
Redirection spam presents a web page with false content to a crawler for indexing, but automatically redirects the browser to a different web page. Redirection is usually immediat...
Kumar Chellapilla, Alexey Maykov