Sciweavers

278 search results - page 36 / 56
» Correcting Dependency Annotation Errors
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 2 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
ICDM
2007
IEEE
122views Data Mining» more  ICDM 2007»
14 years 3 months ago
Noise Modeling with Associative Corruption Rules
This paper presents an active learning approach to the problem of systematic noise inference and noise elimination, specifically the inference of Associated Corruption (AC) rules...
Yan Zhang, Xindong Wu
DCC
2006
IEEE
14 years 8 months ago
Evaluation codes and plane valuations
Abstract. We apply tools coming from singularity theory, as Hamburger-Noether expansions, and from valuation theory, as generating sequences, to explicitly describe order functions...
C. Galindo, M. Sanchis
FGIT
2009
Springer
14 years 3 months ago
Object Surface Reconstruction from One Camera System
In this paper, there is introduced an approach to surface reconstruction of an object captured by one grayscale camera with a small resolution. The proposed solution expects a rec...
Radim Dvorak, Martin Drahanský, Filip Ors&a...
DSN
2005
IEEE
14 years 2 months ago
Model-Based Failure Analysis of Journaling File Systems
We propose a novel method to measure the dependability of journaling file systems. In our approach, we build models of how journaling file systems must behave under different jo...
Vijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Rem...