Sciweavers

5284 search results - page 962 / 1057
» Sampling search-engine results
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 10 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
IR
2006
13 years 10 months ago
Hierarchical clustering of a Finnish newspaper article collection with graded relevance assessments
Search facilitated with agglomerative hierarchical clustering methods was studied in a collection of Finnish newspaper articles (N = 53,893). To allow quick experiments, clustering...
Tuomo Korenius, Jorma Laurikkala, Martti Juhola, K...
JGS
2006
154views more  JGS 2006»
13 years 10 months ago
Area-to-point Kriging with inequality-type data
In practical applications of area-to-point spatial interpolation, inequality constraints, such as non-negativity, or more general constraints on the maximum and/or minimum allowab...
E.-H. Yoo, Phaedon C. Kyriakidis
EJIS
2007
140views more  EJIS 2007»
13 years 10 months ago
External Web content and its influence on organizational performance
Research into the Internet has experienced a tremendous growth within the field of information systems. In this sense, the recent literature focuses on more complex research topic...
Ángel Meroño-Cerdan, Pedro Soto-Acos...
JMLR
2006
148views more  JMLR 2006»
13 years 10 months ago
Computational and Theoretical Analysis of Null Space and Orthogonal Linear Discriminant Analysis
Dimensionality reduction is an important pre-processing step in many applications. Linear discriminant analysis (LDA) is a classical statistical approach for supervised dimensiona...
Jieping Ye, Tao Xiong