Sciweavers

221 search results - page 21 / 45
» Data Hiding Techniques Using Prime and Natural Numbers
Sort
View
SIGSOFT
1998
ACM
13 years 11 months ago
Further Empirical Studies of Test Effectiveness
This paper reports on an empirical evaluation of the fault-detecting ability of two white-box software testing techniques: decision coverage (branch testing) and the all-uses data...
Phyllis G. Frankl, Oleg Iakounenko
ISVC
2007
Springer
14 years 1 months ago
Automatic Image Representation for Content-Based Access to Personal Photo Album
Abstract. The proposed work exploits methods and techniques for automatic characterization of images for content-based access to personal photo libraries. Several techniques, even ...
Edoardo Ardizzone, Marco La Cascia, Filippo Vella
JSAC
2007
87views more  JSAC 2007»
13 years 7 months ago
Performance Analysis of Scheduling in Multiuser MIMO Systems with Zero-Forcing Receivers
— Despite its low-complexity, the zero-forcing receiver is known to suffer from noise enhancement to restore the spatially multiplexed data in a single-user MIMO system. Neverthe...
Chiung-Jang Chen, Li-Chun Wang
ICDE
2007
IEEE
165views Database» more  ICDE 2007»
14 years 9 months ago
On Randomization, Public Information and the Curse of Dimensionality
A key method for privacy preserving data mining is that of randomization. Unlike k-anonymity, this technique does not include public information in the underlying assumptions. In ...
Charu C. Aggarwal
MICCAI
2000
Springer
13 years 11 months ago
Generalized Correlation Ratio for Rigid Registration of 3D Ultrasound with MR Images
Abstract. Automatic processing of 3D ultrasound (US) is of great interest for the development of innovative and low-cost computer-assisted surgery tools. In this paper, we present ...
Alexis Roche, Xavier Pennec, Michael Rudolph, Doro...