Sciweavers

3225 search results - page 642 / 645
» Compiling Experience into Knowledge
Sort
View
TIP
2010
107views more  TIP 2010»
13 years 2 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
TMI
2010
208views more  TMI 2010»
13 years 2 months ago
Patient-Specific Modeling and Quantification of the Aortic and Mitral Valves From 4-D Cardiac CT and TEE
As decisions in cardiology increasingly rely on non-invasive methods, fast and precise image processing tools have become a crucial component of the analysis workflow. To the best ...
Razvan Ioan Ionasec, Ingmar Voigt, Bogdan Georgesc...
ICDE
2011
IEEE
237views Database» more  ICDE 2011»
12 years 11 months ago
Creating probabilistic databases from imprecise time-series data
— Although efficient processing of probabilistic databases is a well-established field, a wide range of applications are still unable to benefit from these techniques due to t...
Saket Sathe, Hoyoung Jeung, Karl Aberer
INFOCOM
2011
IEEE
12 years 11 months ago
A distributed and privacy preserving algorithm for identifying information hubs in social networks
—This paper addresses the problem of identifying the top-k information hubs in a social network. Identifying topk information hubs is crucial for many applications such as advert...
Muhammad Usman Ilyas, Muhammad Zubair Shafiq, Alex...
BMCBI
2011
12 years 11 months ago
BICEPP: an example-based statistical text mining method for predicting the binary characteristics of drugs
Background: The identification of drug characteristics is a clinically important task, but it requires much expert knowledge and consumes substantial resources. We have developed ...
Frank P. Y. Lin, Stephen Anthony, Thomas M. Polase...