Sciweavers

3717 search results - page 613 / 744
» The Persistence of Statistical Information
Sort
View
PR
2006
119views more  PR 2006»
13 years 9 months ago
Performance evaluation and optimization for content-based image retrieval
Performance evaluation of content-based image retrieval (CBIR) systems is an important but still unsolved problem. The reason for its importance is that only performance evaluatio...
Julia Vogel, Bernt Schiele
IJBC
2007
89views more  IJBC 2007»
13 years 9 months ago
Galton's quincunx: Random Walk or Chaos?
In 1873 Francis Galton had constructed a simple mechanical device where a ball is dropped vertically through a harrow of pins that deflect the ball sideways as it falls. Galton c...
Kevin Judd
AIEDU
2005
106views more  AIEDU 2005»
13 years 9 months ago
A Comparison of Model-Tracing and Constraint-Based Intelligent Tutoring Paradigms
Two approaches to building intelligent tutoring systems are the well-established model-tracing paradigm and the relatively newer constraint-based paradigm. Proponents of the constr...
Viswanathan Kodaganallur, Rob R. Weitz, David Rose...
IJNSEC
2007
121views more  IJNSEC 2007»
13 years 9 months ago
Data Hiding in a Kind of PDF Texts for Secret Communication
In this paper, we present a novel steganographic technique for hiding data in a kind of PDF texts. We first point out the secret channels in a kind of PDF English texts, which ar...
Shangping Zhong, Xueqi Cheng, Tierui Chen
IJSN
2007
73views more  IJSN 2007»
13 years 9 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji