Sciweavers

130 search results - page 14 / 26
» Efficiently Verifiable Escape Analysis
Sort
View
TIP
2010
107views more  TIP 2010»
13 years 2 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
BMCBI
2007
162views more  BMCBI 2007»
13 years 7 months ago
Genome-wide identification of specific oligonucleotides using artificial neural network and computational genomic analysis
Background: Genome-wide identification of specific oligonucleotides (oligos) is a computationallyintensive task and is a requirement for designing microarray probes, primers, and ...
Chun-Chi Liu, Chin-Chung Lin, Ker-Chau Li, Wen-Shy...

Publication
261views
15 years 5 months ago
Improving Explicit Congestion Notification with the Mark-Front Strategy
Delivering congestion signals is essential to the performance of networks. Current TCP/IP networks use packet losses to signal congestion. Packet losses not only reduces TCP perfor...
Chunlei Liu, Raj Jain,
ICIP
2009
IEEE
14 years 8 months ago
Poisson-haar Transform: A Nonlinear Multiscale Representation For Photon-limited Image Denoising
We present a novel multiscale image representation belonging to the class of multiscale multiplicative decompositions, which we term Poisson-Haar transform. The proposed represent...
ISBI
2008
IEEE
14 years 8 months ago
Projection plane processing for sketch-based volume segmentation
Selecting a region of interest (ROI) within unsegmented volume data is one of the fundamental operations in volume data processing and analysis, yet it is difficult to perform the...
Shigeru Owada, Frank Nielsen, Takeo Igarashi, Ryo ...