Sciweavers

909 search results - page 115 / 182
» Reversible data hiding
Sort
View
ML
2000
ACM
144views Machine Learning» more  ML 2000»
13 years 10 months ago
MultiBoosting: A Technique for Combining Boosting and Wagging
MultiBoosting is an extension to the highly successful AdaBoost technique for forming decision committees. MultiBoosting can be viewed as combining AdaBoost with wagging. It is abl...
Geoffrey I. Webb
PRL
2007
115views more  PRL 2007»
13 years 9 months ago
A decomposition scheme for 3D fuzzy objects based on fuzzy distance information
A decomposition scheme for 3D fuzzy objects is presented. The decomposition is guided by a fuzzy distance transform (FDT) of the fuzzy object and aims to decompose the fuzzy objec...
Stina Svensson
FDTC
2010
Springer
124views Cryptology» more  FDTC 2010»
13 years 8 months ago
Optical Fault Masking Attacks
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing ...
Sergei Skorobogatov
WCRE
2007
IEEE
14 years 4 months ago
Discovering the Objectual Meaning of Foreign Key Constraints in Enterprise Applications
The software industry is increasingly confronted with the issues of understanding and maintaining a special type of object-oriented systems, namely enterprise applications. A spec...
Cristina Marinescu
BIOSYSTEMS
2007
115views more  BIOSYSTEMS 2007»
13 years 10 months ago
Evolving fuzzy rules to model gene expression
This paper develops an algorithm that extracts explanatory rules from microarray data, which we treat as time series, using genetic programming (GP) and fuzzy logic. Reverse polis...
Ricardo Linden, Amit Bhaya