Sciweavers

299 search results - page 32 / 60
» Use of Pricing Schemes for Differentiating Information Goods
Sort
View
FUIN
2011
358views Cryptology» more  FUIN 2011»
13 years 3 days ago
Unsupervised and Supervised Learning Approaches Together for Microarray Analysis
In this article, a novel concept is introduced by using both unsupervised and supervised learning. For unsupervised learning, the problem of fuzzy clustering in microarray data as ...
Indrajit Saha, Ujjwal Maulik, Sanghamitra Bandyopa...
SECON
2007
IEEE
14 years 2 months ago
Coverage Protocol for Wireless Sensor Networks Using Distance Estimates
— In wireless sensor networks, it is desirable to maintain good sensing coverage while keeping the number of active sensor nodes small to achieve long system lifetime. Existing c...
Mingze Zhang, Mun Choon Chan, Akkihebbal L. Ananda
MICAI
2010
Springer
13 years 6 months ago
Automatic Image Annotation Using Multiple Grid Segmentation
Abstract. Automatic image annotation refers to the process of automatically labeling an image with a predefined set of keywords. Image annotation is an important step of content-ba...
Gerardo Arellano, Luis Enrique Sucar, Eduardo F. M...
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
14 years 9 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
IH
1998
Springer
14 years 26 days ago
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects....
Fabien A. P. Petitcolas, Ross J. Anderson, Markus ...