Sciweavers

325 search results - page 26 / 65
» Detecting Merging and Splitting using Origin Analysis
Sort
View
IH
1999
Springer
13 years 11 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel
BMCBI
2010
161views more  BMCBI 2010»
13 years 4 months ago
Application of Wavelet Packet Transform to detect genetic polymorphisms by the analysis of inter-Alu PCR patterns
Background: The analysis of Inter-Alu PCR patterns obtained from human genomic DNA samples is a promising technique for a simultaneous analysis of many genomic loci flanked by Alu...
Maurizio Cardelli, Matteo Nicoli, Armando Bazzani,...
ICCV
2005
IEEE
14 years 1 months ago
Object Detection in Aerial Imagery Based on Enhanced Semi-Supervised Learning
Object detection in aerial imagery has been well studied in computer vision for years. However, given the complexity of large variations of the appearance of the object and the ba...
Jian Yao, Zhongfei (Mark) Zhang
ACMSE
2006
ACM
13 years 9 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray
RAID
2005
Springer
14 years 27 days ago
Polymorphic Worm Detection Using Structural Information of Executables
Abstract. Network worms are malicious programs that spread automatically across networks by exploiting vulnerabilities that affect a large number of hosts. Because of the speed at...
Christopher Krügel, Engin Kirda, Darren Mutz,...