Sciweavers

988 search results - page 133 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
AMC
2007
134views more  AMC 2007»
13 years 9 months ago
An image fragile watermark scheme based on chaotic image pattern and pixel-pairs
Fragile watermarking techniques for digital content have been studied in the past few years. Fragile watermarks are used to determine if a piece of watermarked digital content has...
Shaohui Liu, Hongxun Yao, Wen Gao, Yongliang Liu
DATAMINE
2010
122views more  DATAMINE 2010»
13 years 9 months ago
Three naive Bayes approaches for discrimination-free classification
In this paper, we investigate how to modify the Naive Bayes classifier in order to perform classification that is restricted to be independent with respect to a given sensitive att...
Toon Calders, Sicco Verwer
JIRS
2006
95views more  JIRS 2006»
13 years 9 months ago
Vision-based Target Geo-location using a Fixed-wing Miniature Air Vehicle
This paper presents a method for determining the GPS location of a ground-based object when imaged from a fixed-wing miniature air vehicle (MAV). Using the pixel location of the ta...
D. Blake Barber, Joshua D. Redding, Timothy W. McL...
TIT
2008
101views more  TIT 2008»
13 years 8 months ago
Low-Rate Repeat-Zigzag-Hadamard Codes
In this paper, we propose a new class of low-rate error correction codes called repeat-zigzag-Hadamard (RZH) codes featuring simple encoder and decoder structures, and flexible cod...
Kai Li, Guosen Yue, Xiaodong Wang, Li Ping
COMGEO
2004
ACM
13 years 8 months ago
A multi-dimensional approach to force-directed layouts of large graphs
We present a novel hierarchical force-directed method for drawing large graphs. Given a graph G = (V,E), the algorithm produces an embedding for G in an Euclidean space E of any d...
Pawel Gajer, Michael T. Goodrich, Stephen G. Kobou...