Sciweavers

198 search results - page 25 / 40
» Robust lossless data hiding: Analysis and evaluation
Sort
View
SIGIR
2009
ACM
14 years 3 months ago
Automatic video tagging using content redundancy
The analysis of the leading social video sharing platform YouTube reveals a high amount of redundancy, in the form of videos with overlapping or duplicated content. In this paper,...
Stefan Siersdorfer, José San Pedro, Mark Sa...
ICDM
2008
IEEE
109views Data Mining» more  ICDM 2008»
14 years 3 months ago
Quantitative Association Analysis Using Tree Hierarchies
Association analysis arises in many important applications such as bioinformatics and business intelligence. Given a large collection of measurements over a set of samples, associ...
Feng Pan, Lynda Yang, Leonard McMillan, Fernando P...
BMCBI
2007
139views more  BMCBI 2007»
13 years 8 months ago
Bioinformatics analysis of the early inflammatory response in a rat thermal injury model
Background: Thermal injury is among the most severe forms of trauma and its effects are both local and systemic. Response to thermal injury includes cellular protection mechanisms...
Eric Yang, Timothy Maguire, Martin L. Yarmush, Fra...
ICDT
2010
ACM
211views Database» more  ICDT 2010»
14 years 6 months ago
Probabilistic Data Exchange
The work reported here lays the foundations of data exchange in the presence of probabilistic data. This requires rethinking the very basic concepts of traditional data exchange, ...
Ronald Fagin, Benny Kimelfeld, Phokion Kolaitis
INFOCOM
2006
IEEE
14 years 2 months ago
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
Kui Ren, Wenjing Lou, Yanchao Zhang