Sciweavers

822 search results - page 13 / 165
» Visualization techniques utilizing the sensitivity analysis ...
Sort
View
TITB
2010
165views Education» more  TITB 2010»
13 years 2 months ago
On combining morphological component analysis and concentric morphology model for mammographic mass detection
Mammographic mass detection is an important task for the early diagnosis of breast cancer. However, it is difficult to distinguish masses from normal regions because of their abund...
Xinbo Gao, Ying Wang, Xuelong Li, Dacheng Tao
WPES
2003
ACM
14 years 1 months ago
Analysis of privacy preserving random perturbation techniques: further explorations
Privacy is becoming an increasingly important issue in many data mining applications, particularly in the security and defense area. This has triggered the development of many pri...
Haimonti Dutta, Hillol Kargupta, Souptik Datta, Kr...
APVIS
2008
13 years 9 months ago
Interactive Visual Analysis of the NSF Funding Information
This paper presents an interactive visualization toolkit for navigating and analyzing the National Science Foundation (NSF) funding information. Our design builds upon the treemap...
Shixia Liu, Nan Cao, Hao Lv
CODES
2006
IEEE
14 years 2 months ago
Creation and utilization of a virtual platform for embedded software optimization: : an industrial case study
Virtual platform (ViP), or ESL (Electronic System Level) simulation model, is one of the most widely renowned system level design techniques. In this paper, we present a case stud...
Sungpack Hong, Sungjoo Yoo, Sheayun Lee, Sangwoo L...
ICIAR
2004
Springer
14 years 1 months ago
A Secure and Localizing Watermarking Technique for Image Authentication
In this paper, a new block-based image-dependent watermarking technique is proposed. The proposed technique utilizes the correlation coefficient statistic to produce a short and un...
Abdelkader H. Ouda, Mahmoud R. El-Sakka