Sciweavers

909 search results - page 49 / 182
» Reversible data hiding
Sort
View
INFOCOM
2006
IEEE
14 years 4 months ago
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications
— A key function for network traffic monitoring and analysis is the ability to perform aggregate queries over multiple data streams. Change detection is an important primitive w...
Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao...
ICDE
2006
IEEE
135views Database» more  ICDE 2006»
14 years 11 months ago
Reverse Nearest Neighbors Search in Ad-hoc Subspaces
Given an object q, modeled by a multidimensional point, a reverse nearest neighbors (RNN) query returns the set of objects in the database that have q as their nearest neighbor. I...
Man Lung Yiu, Nikos Mamoulis
BMVC
2000
13 years 11 months ago
Parallel Chains, Delayed Rejection and Reversible Jump MCMC for Object Recognition
We tackle the problem of object recognition using a Bayesian approach. A marked point process [1] is used as a prior model for the (unknown number of) objects. A sample is generat...
M. Harkness, P. Green
VLDB
2007
ACM
108views Database» more  VLDB 2007»
14 years 10 months ago
Time Series Compressibility and Privacy
In this paper we study the trade-offs between time series compressibility and partial information hiding and their fundamental implications on how we should introduce uncertainty ...
Spiros Papadimitriou, Feifei Li, George Kollios, P...
ICSM
2002
IEEE
14 years 3 months ago
Columbus - Reverse Engineering Tool and Schema for C++
One of the most critical issues in large-scale software development and maintenance is the rapidly growing size and complexity of software systems. As a result of this rapid growt...
Rudolf Ferenc, Árpád Beszédes...