Sciweavers

1143 search results - page 201 / 229
» Extraction in software watermarking
Sort
View
MM
2010
ACM
199views Multimedia» more  MM 2010»
13 years 10 months ago
TOP-SURF: a visual words toolkit
TOP-SURF is an image descriptor that combines interest points with visual words, resulting in a high performance yet compact descriptor that is designed with a wide range of conte...
Bart Thomee, Erwin M. Bakker, Michael S. Lew
IJSI
2008
129views more  IJSI 2008»
13 years 10 months ago
Managing the Acronym/Expansion Identification Process for Text-Mining Applications
This paper deals with an acronym/definition extraction approach from textual data (corpora) and the disambiguation of these definitions (or expansions). Both steps of our global pr...
Mathieu Roche, Violaine Prince
JUCS
2006
92views more  JUCS 2006»
13 years 10 months ago
Program Slicing by Calculation
: Program slicing is a well known family of techniques used to identify code fragments which depend on or are depended upon specific program entities. They are particularly useful ...
Nuno F. Rodrigues, Luís Soares Barbosa
IJDE
2007
110views more  IJDE 2007»
13 years 9 months ago
iPOD Forensics Update
From student to business worker, the popularity and ubiquity of mobile devices is exploding. As these devices saturate modern culture, they continue to grow in functionality. Such...
Matthew Kiley, Tim Shinbara, Marcus Rogers
IJNSEC
2007
194views more  IJNSEC 2007»
13 years 9 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...