Sciweavers

1147 search results - page 115 / 230
» Transformation of Access Rights
Sort
View
SISAP
2009
IEEE
134views Data Mining» more  SISAP 2009»
14 years 3 months ago
Searching by Similarity and Classifying Images on a Very Large Scale
—In the demonstration we will show a system for searching by similarity and automatically classifying images in a very large dataset. The demonstrated techniques are based on the...
Giuseppe Amato, Pasquale Savino
EUROCRYPT
2004
Springer
14 years 2 months ago
Positive Results and Techniques for Obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program P into a new program O(P) with the same functionality as P, but such that O(P)...
Ben Lynn, Manoj Prabhakaran, Amit Sahai
ICMCS
2007
IEEE
164views Multimedia» more  ICMCS 2007»
14 years 3 months ago
Medical Visual Information Retrieval: State of the Art and Challenges Ahead
Today’s medical institutions produce enormous amounts of data on patients, including multimedia data, which is increasingly produced in digital form. These data in their clinica...
Henning Müller, Xin Zhou, Adrien Depeursinge,...
HICSS
2003
IEEE
126views Biometrics» more  HICSS 2003»
14 years 2 months ago
A Watermarking Infrastructure for Enterprise Document Management
Digital watermarking is a promising technology to embed copyright information as unperceivable signals in digital contents. Although various watermarking techniques have been empl...
Shing-Chi Cheung, Dickson K. W. Chiu
ISCA
2002
IEEE
68views Hardware» more  ISCA 2002»
14 years 1 months ago
Timekeeping in the Memory System: Predicting and Optimizing Memory Behavior
Techniques for analyzing and improving memory referencing behavior continue to be important for achieving good overall program performance due to the ever-increasing performance g...
Zhigang Hu, Margaret Martonosi, Stefanos Kaxiras