Sciweavers

71 search results - page 7 / 15
» kes 2005
Sort
View
KES
2005
Springer
14 years 1 months ago
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack
Abstract. Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random...
Xinpeng Zhang, Shuozhong Wang
KES
2005
Springer
14 years 1 months ago
Learning Method for Automatic Acquisition of Translation Knowledge
This paper presents a new learning method for automatic acquisition of translation knowledge from parallel corpora. We apply this learning method to automatic extraction of bilingu...
Hiroshi Echizen-ya, Kenji Araki, Yoshio Momouchi
KES
2005
Springer
14 years 1 months ago
Bayesian Validation of Fuzzy Clustering for Analysis of Yeast Cell Cycle Data
Clustering for the analysis of the gene expression profiles has been used for identifying the functions of the genes and of unknown genes. Since the genes usually belong to multipl...
Kyung-Joong Kim, Si-Ho Yoo, Sung-Bae Cho
KES
2005
Springer
14 years 1 months ago
Recognizing and Simulating Sketched Logic Circuits
This paper presents a system for recognizing sketched logic circuits in real-time and graphically simulating them afterwords. It has been developed for use in university and school...
Marcus Liwicki, Lars Knipping
KES
2005
Springer
14 years 1 months ago
Measurement of Human Concentration with Multiple Cameras
Abstract. We propose a new method to estimate human change of concentration from multiple camera views of the human. In our method, human state of concentration is observed as self...
Kazuhiko Sumi, Koichi Tanaka, Takashi Matsuyama