Sciweavers

2386 search results - page 397 / 478
» Database Security 2000
Sort
View
HVEI
2010
13 years 11 months ago
A subjective study to evaluate video quality assessment algorithms
Automatic methods to evaluate the perceptual quality of a digital video sequence have widespread applications wherever the end-user is a human. Several objective video quality ass...
Kalpana Seshadrinathan, Rajiv Soundararajan, Alan ...
BMCBI
2007
115views more  BMCBI 2007»
13 years 10 months ago
Seven Golden Rules for heuristic filtering of molecular formulas obtained by accurate mass spectrometry
Background: Structure elucidation of unknown small molecules by mass spectrometry is a challenge despite advances in instrumentation. The first crucial step is to obtain correct e...
Tobias Kind, Oliver Fiehn
KDD
2012
ACM
212views Data Mining» more  KDD 2012»
12 years 13 days ago
Harnessing the wisdom of the crowds for accurate web page clipping
Clipping Web pages, namely extracting the informative clips (areas) from Web pages, has many applications, such as Web printing and e-reading on small handheld devices. Although m...
Lei Zhang, Linpeng Tang, Ping Luo, Enhong Chen, Li...
WWW
2007
ACM
14 years 10 months ago
Detectives: detecting coalition hit inflation attacks in advertising networks streams
Click fraud is jeopardizing the industry of Internet advertising. Internet advertising is crucial for the thriving of the entire Internet, since it allows producers to advertise t...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
KDD
2009
ACM
133views Data Mining» more  KDD 2009»
14 years 10 months ago
On the tradeoff between privacy and utility in data publishing
In data publishing, anonymization techniques such as generalization and bucketization have been designed to provide privacy protection. In the meanwhile, they reduce the utility o...
Tiancheng Li, Ninghui Li