Sciweavers

2827 search results - page 157 / 566
» Data Hiding in Video
Sort
View
CVPR
2010
IEEE
16 years 1 months ago
Unsupervised Learning of Invariant Features Using Video
We present an algorithm that learns invariant features from real data in an entirely unsupervised fashion. The principal benefit of our method is that it can be applied without hu...
David Stavens, Sebastian Thrun
152
Voted
BMCBI
2004
174views more  BMCBI 2004»
15 years 4 months ago
SeeGH - A software tool for visualization of whole genome array comparative genomic hybridization data
Background: Array comparative genomic hybridization (CGH) is a technique which detects copy number differences in DNA segments. Complete sequencing of the human genome and the dev...
Bryan Chi, Ronald J. deLeeuw, Bradley P. Coe, Calu...
147
Voted
CORR
2008
Springer
102views Education» more  CORR 2008»
15 years 4 months ago
An MAS-Based ETL Approach for Complex Data
: In a data warehousing process, the phase of data integration is crucial. Many methods for data integration have been published in the literature. However, with the development of...
Omar Boussaid, Fadila Bentayeb, Jérôm...
DAC
1999
ACM
16 years 5 months ago
Behavioral Synthesis Techniques for Intellectual Property Protection
? The economic viability of the reusable core-based design paradigm depends on the development of techniques for intellectual property protection. We introduce the first dynamic wa...
Inki Hong, Miodrag Potkonjak
NDSS
2009
IEEE
15 years 11 months ago
K-Tracer: A System for Extracting Kernel Malware Behavior
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an oper...
Andrea Lanzi, Monirul I. Sharif, Wenke Lee