Sciweavers

651 search results - page 59 / 131
» Index Sets and Universal Numberings
Sort
View
ICIP
2005
IEEE
14 years 10 months ago
Statistical restoration for robust and secure steganography
We investigate data hiding techniques that attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover. The approach is to rese...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
ESORICS
2009
Springer
14 years 9 months ago
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
Abstract. As the number and scope of government regulations and rules mandating trustworthy retention of data keep growing, businesses today are facing a higher degree of regulatio...
Tiancheng Li, Xiaonan Ma, Ninghui Li
VLDB
2009
ACM
130views Database» more  VLDB 2009»
14 years 9 months ago
Multi-dimensional top-k dominating queries
Abstract The top-k dominating query returns k data objects which dominate the highest number of objects in a dataset. This query is an important tool for decision support since it ...
Man Lung Yiu, Nikos Mamoulis
EDBT
2006
ACM
159views Database» more  EDBT 2006»
14 years 9 months ago
Fast Nearest Neighbor Search on Road Networks
Nearest neighbor (NN) queries have been extended from Euclidean spaces to road networks. Existing approaches are either based on Dijkstra-like network expansion or NN/distance prec...
Haibo Hu, Dik Lun Lee, Jianliang Xu
PDP
2008
IEEE
14 years 3 months ago
Load Balancing Distributed Inverted Files: Query Ranking
Search engines use inverted files as index data structures to speed up the solution of user queries. The index is distributed on a set of processors forming a cluster of computer...
Carlos Gomez-Pantoja, Mauricio Marín