Sciweavers

1147 search results - page 204 / 230
» Transformation of Access Rights
Sort
View
KDD
2000
ACM
142views Data Mining» more  KDD 2000»
13 years 11 months ago
Automating exploratory data analysis for efficient data mining
Having access to large data sets for the purpose of predictive data mining does not guarantee good models, even when the size of the training data is virtually unlimited. Instead,...
Jonathan D. Becher, Pavel Berkhin, Edmund Freeman
CF
2005
ACM
13 years 9 months ago
Matrix register file and extended subwords: two techniques for embedded media processors
In this paper we employ two techniques suitable for embedded media processors. The first technique, extended subwords, uses four extra bits for every byte in a media register. Th...
Asadollah Shahbahrami, Ben H. H. Juurlink, Stamati...
CRV
2008
IEEE
125views Robotics» more  CRV 2008»
13 years 9 months ago
Enhancing Steganography in Digital Images
The recent digital revolution has facilitated communication, data portability and on-the-fly manipulation. Unfortunately, this has brought along some critical security vulnerabili...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
DOCENG
2008
ACM
13 years 9 months ago
Interactive office documents: a new face for web 2.0 applications
As the world wide web transforms from a vehicle of information dissemination and e-commerce transactions into a writable nexus of human collaboration, the Web 2.0 technologies at ...
John M. Boyer
DAGSTUHL
2007
13 years 9 months ago
Correlation-based Data Representation
The Dagstuhl Seminar Similarity-based Clustering and its Application to Medicine and Biology (07131) held in March 25–30, 2007, provided an excellent atmosphere for in-depth disc...
Marc Strickert, Udo Seiffert