Sciweavers

534 search results - page 39 / 107
» One more bit is enough
Sort
View
CBMS
2007
IEEE
14 years 2 months ago
An Unsupervised and Fully-Automated Image Analysis Method for cDNA Microarrays
Microarray gene expression image analysis is a labor-intensive task and requires human intervention since microarray images are contaminated with noise and artifacts while spots a...
Eleni Zacharia, Dimitrios E. Maroulis
PCM
2001
Springer
145views Multimedia» more  PCM 2001»
14 years 13 days ago
Color Content Matching of MPEG-4 Video Objects
Abstract. Color histogram is one of the most widely used visual feature representations in content-based retrieval. When processing the image/video data in the JPEG/MPEG compressed...
Berna Erol, Faouzi Kossentini
CSFW
2010
IEEE
13 years 12 months ago
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
—We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding, the state-of-the art...
Boris Köpf, Geoffrey Smith
SPIRE
2000
Springer
13 years 11 months ago
Fast Multipattern Search Algorithms for Intrusion Detection
We present new search algorithms to detect the occurrences of any pattern from a given pattern set in a text, allowing in the occurrences a limited number of spurious text charact...
Josué Kuri, Gonzalo Navarro
GD
2008
Springer
13 years 9 months ago
Succinct Greedy Graph Drawing in the Hyperbolic Plane
We describe an efficient method for drawing any n-vertex simple graph G in the hyperbolic plane. Our algorithm produces greedy drawings, which support greedy geometric routing, so...
David Eppstein, Michael T. Goodrich