Sciweavers

2449 search results - page 485 / 490
» Tensor Embedding Methods
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 7 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
PERVASIVE
2008
Springer
13 years 7 months ago
Detecting Human Movement by Differential Air Pressure Sensing in HVAC System Ductwork: An Exploration in Infrastructure Mediated
We have developed an approach for whole-house gross movement and room transition detection through sensing at only one point in the home. We consider this system to be one member o...
Shwetak N. Patel, Matthew S. Reynolds, Gregory D. ...
TIFS
2008
148views more  TIFS 2008»
13 years 7 months ago
Digital Image Forensics via Intrinsic Fingerprints
Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing popularity a...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu
BMCBI
2005
121views more  BMCBI 2005»
13 years 7 months ago
Evaluation of gene importance in microarray data based upon probability of selection
Background: Microarray devices permit a genome-scale evaluation of gene function. This technology has catalyzed biomedical research and development in recent years. As many import...
Li M. Fu, Casey S. Fu-Liu
BMCBI
2005
118views more  BMCBI 2005»
13 years 7 months ago
Feature selection and nearest centroid classification for protein mass spectrometry
Background: The use of mass spectrometry as a proteomics tool is poised to revolutionize early disease diagnosis and biomarker identification. Unfortunately, before standard super...
Ilya Levner