Sciweavers

1272 search results - page 129 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
SSWMC
2004
13 years 10 months ago
Hiding correlation-based watermark templates using secret modulation
A possible solution to the difficult problem of geometrical distortion of watermarked images in a blind watermarking scenario is to use a template grid in the autocorrelation func...
Jeroen Lichtenauer, Iwan Setyawan, Reginald L. Lag...
DEEC
2006
IEEE
14 years 3 months ago
BestChoice: A Decision Support System for Supplier Selection in e-Marketplaces
A growing number of companies are outsourcing their purchasing processes to independent purchasing agencies. These agencies now have to process an ever increasing number of purchas...
Dongjoo Lee, Taehee Lee, Suekyung Lee, Ok-Ran Jeon...
VLDB
2004
ACM
95views Database» more  VLDB 2004»
14 years 2 months ago
Combating Web Spam with TrustRank
Web spam pages use various techniques to achieve higher-than-deserved rankings in a search engine’s results. While human experts can identify spam, it is too expensive to manual...
Zoltán Gyöngyi, Hector Garcia-Molina, ...
JSA
2010
173views more  JSA 2010»
13 years 4 months ago
Hardware/software support for adaptive work-stealing in on-chip multiprocessor
During the past few years, embedded digital systems have been requested to provide a huge amount of processing power and functionality. A very likely foreseeable step to pursue th...
Quentin L. Meunier, Frédéric P&eacut...
ICDE
2003
IEEE
141views Database» more  ICDE 2003»
14 years 10 months ago
HDoV-tree: The Structure, The Storage, The Speed
In a visualization system, one of the key issues is to optimize performance and visual fidelity. This is especially critical for large virtual environments where the models do not...
Lidan Shou, Zhiyong Huang, Kian-Lee Tan