Sciweavers

532 search results - page 27 / 107
» Extending Scalar Multiplication Using Double Bases
Sort
View
JODS
2006
131views Data Mining» more  JODS 2006»
13 years 8 months ago
Inheritance in Rule-Based Frame Systems: Semantics and Inference
Knowledge representation languages that combine rules with object-oriented features akin to frame systems have recently attracted a lot of research interest, and F-logic is widely ...
Guizhen Yang, Michael Kifer
ICEC
1994
37views more  ICEC 1994»
13 years 10 months ago
A Method for Utilizing Diploid/Dominance in Genetic Search
homologous alleles seemingly compete prior to manifestation in the observed phenotype, will be referred to as sub-phenotype interaction.A method is proposed for implementing diploi...
F. Greene
EDBT
2009
ACM
136views Database» more  EDBT 2009»
14 years 3 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
PCM
2001
Springer
114views Multimedia» more  PCM 2001»
14 years 1 months ago
A Multiresolutional Coding Method Based on SPIHT
In this work, we incorporate a multiresolutional coding functionality into the SPIHT algorithm [1]. The multiresolutional coding can be considered as a kind of the region of intere...
Keun-hyeong Park, Chul-Soo Lee, Hyun Wook Park
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 2 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...