Sciweavers

909 search results - page 35 / 182
» Reversible data hiding
Sort
View
DCC
2000
IEEE
13 years 10 months ago
Data Partitioning and Reversible Variable Length Codes for Robust Video Communications
Low bit-rate multimedia communication over wireless channels has received much attention recently. A key challenge in low bit-rate wireless communication is the very high error ra...
Adam H. Li, Surin Kittitornkun, Yu Hen Hu, Dong-Se...
PVLDB
2008
232views more  PVLDB 2008»
13 years 8 months ago
FINCH: evaluating reverse k-Nearest-Neighbor queries on location data
A Reverse k-Nearest-Neighbor (RkNN) query finds the objects that take the query object as one of their k nearest neighbors. In this paper we propose new solutions for evaluating R...
Wei Wu, Fei Yang, Chee Yong Chan, Kian-Lee Tan
EDBT
2009
ACM
195views Database» more  EDBT 2009»
14 years 4 months ago
Anonymizing moving objects: how to hide a MOB in a crowd?
Moving object databases (MOD) have gained much interest in recent years due to the advances in mobile communications and positioning technologies. Study of MOD can reveal useful i...
Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshm...
BMCBI
2010
176views more  BMCBI 2010»
13 years 10 months ago
Reverse engineering gene regulatory network from microarray data using linear time-variant model
nd: Gene regulatory network is an abstract mapping of gene regulations in living cells that can help to predict the system behavior of living organisms. Such prediction capability...
Mitra Kabir, Nasimul Noman, Hitoshi Iba
IEEEIAS
2007
IEEE
14 years 4 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...