Sciweavers

1401 search results - page 255 / 281
» Cost-Sensitive Test Strategies
Sort
View
AINA
2009
IEEE
14 years 2 months ago
JPEG Steganography: A Performance Evaluation of Quantization Tables
The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and effic...
Adel Almohammad, Gheorghita Ghinea, Robert M. Hier...
CRV
2009
IEEE
237views Robotics» more  CRV 2009»
14 years 2 months ago
SEC: Stochastic Ensemble Consensus Approach to Unsupervised SAR Sea-Ice Segmentation
The use of synthetic aperture radar (SAR) has become an integral part of sea-ice monitoring and analysis in the polar regions. An important task in sea-ice analysis is to segment ...
Alexander Wong, David A. Clausi, Paul W. Fieguth
DATE
2009
IEEE
127views Hardware» more  DATE 2009»
14 years 2 months ago
Process variation aware thread mapping for Chip Multiprocessors
Abstract—With the increasing scaling of manufacturing technology, process variation is a phenomenon that has become more prevalent. As a result, in the context of Chip Multiproce...
Shengyan Hong, Sri Hari Krishna Narayanan, Mahmut ...
ICRA
2009
IEEE
140views Robotics» more  ICRA 2009»
14 years 2 months ago
1000 Trials: An empirically validated end effector that robustly grasps objects from the floor
—Unstructured, human environments present great challenges and opportunities for robotic manipulation and grasping. Robots that reliably grasp household objects with unknown or u...
Zhe Xu, Travis Deyle, Charles C. Kemp
AIRWEB
2009
Springer
14 years 2 months ago
Tag spam creates large non-giant connected components
Spammers in social bookmarking systems try to mimick bookmarking behaviour of real users to gain the attention of other users or search engines. Several methods have been proposed...
Nicolas Neubauer, Robert Wetzker, Klaus Obermayer