Sciweavers

909 search results - page 152 / 182
» Reversible data hiding
Sort
View
ISCI
2007
135views more  ISCI 2007»
13 years 9 months ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape
TKDE
2008
134views more  TKDE 2008»
13 years 9 months ago
Contraflow Transportation Network Reconfiguration for Evacuation Route Planning
Given a transportation network having source nodes with evacuees and destination nodes, we want to find a contraflow network configuration (that is, ideal direction for each edge) ...
Sangho Kim, Shashi Shekhar, Manki Min
TMI
2008
108views more  TMI 2008»
13 years 9 months ago
A Comprehensive Approach to the Analysis of Contrast Enhanced Cardiac MR Images
Abstract--Current magnetic resonance imaging (MRI) technology allows the determination of patient-individual coronary tree structure, detection of infarctions, and assessment of my...
Anja Hennemuth, A. Seeger, Ola Friman, S. Miller, ...
JMLR
2002
102views more  JMLR 2002»
13 years 8 months ago
Optimal Structure Identification With Greedy Search
In this paper we prove the so-called "Meek Conjecture". In particular, we show that if a DAG H is an independence map of another DAG G, then there exists a finite sequen...
David Maxwell Chickering
PRESENCE
1998
83views more  PRESENCE 1998»
13 years 8 months ago
Real-Time Continuous Multi-Resolution Method for Models of Arbitrary Topology
Many multiresolution methods have been proposed. Most of them emphasize accuracy and hence are slow. Some methods may be fast, but they may not preserve the geometry of the model....
Rynson W. H. Lau, Mark Green, Danny S. P. To, Jani...