Sciweavers

12101 search results - page 2316 / 2421
» Mutual Information Analysis
Sort
View
IWDW
2007
Springer
14 years 4 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
RECOMB
2007
Springer
14 years 4 months ago
Network Legos: Building Blocks of Cellular Wiring Diagrams
Publicly-available data sets provide detailed and large-scale information on multiple types of molecular interaction networks in a number of model organisms. These multi-modal univ...
T. M. Murali, Corban G. Rivera
TSD
2007
Springer
14 years 4 months ago
Lexical and Perceptual Grounding of a Sound Ontology
Sound ontologies need to incorporate source unidentifiable sounds in an adequate and consistent manner. Computational lexical resources like WordNet have either inserted these des...
Anna Lobanova, Jennifer Spenader, Bea Valkenier
VLDB
2007
ACM
111views Database» more  VLDB 2007»
14 years 4 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
ASWEC
2006
IEEE
14 years 4 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
« Prev « First page 2316 / 2421 Last » Next »