Sciweavers

IH
2010
Springer
13 years 7 months ago
Detection of Copy-Rotate-Move Forgery Using Zernike Moments
As forgeries have become popular, the importance of forgery detection is much increased. Copy-move forgery, one of the most commonly used methods, copies a part of the image and pa...
Seung-Jin Ryu, Min-Jeong Lee, Heung-Kyu Lee
IFIP12
2010
13 years 7 months ago
Rule Learning with Negation: Issues Regarding Effectiveness
: An investigation of rule learning processes that allow the inclusion of negated features is described. The objective is to establish whether the use of negation in inductive rule...
Stephanie Chua, Frans Coenen, Grant Malcolm

Publication
241views
13 years 7 months ago
Contourlet Transform for Texture Representation of Ultrasound Thyroid Images
Texture representation of ultrasound (US) images is currently considered a major issue in medical image analysis. This paper investigates the texture representation of thyroid tiss...
Stamos Katsigiannis, Eystratios G. Keramidas, Dimi...
IFIP12
2010
13 years 7 months ago
Learning the Preferences of News Readers with SVM and Lasso Ranking
We attack the task of predicting which news-stories are more appealing to a given audience by comparing ‘most popular stories’, gathered from various online news outlets, over ...
Elena Hensinger, Ilias N. Flaounas, Nello Cristian...
IEEECIT
2010
IEEE
13 years 7 months ago
Fuzzy Location Service for Mobile Ad Hoc Networks
Abstract—Over the past years, location-based routing protocols have been studied extensively in mobile ad hoc networks (MANETs). However, how to efficiently provide the location ...
Yongming Xie, Guojun Wang, Jie Wu
IEEECIT
2010
IEEE
13 years 7 months ago
Exploiting More Parallelism from Applications Having Generalized Reductions on GPU Architectures
Reduction is a common component of many applications, but can often be the limiting factor for parallelization. Previous reduction work has focused on detecting reduction idioms a...
Xiao-Long Wu, Nady Obeid, Wen-Mei Hwu
IEEECIT
2010
IEEE
13 years 7 months ago
Mixed-Criticality Real-Time Scheduling for Multicore Systems
Current hard real-time scheduling and analysis techniques are unable to efficiently utilize the computational bandwidth provided by multicore platforms. This is due to the large ...
Malcolm S. Mollison, Jeremy P. Erickson, James H. ...
IEEECIT
2010
IEEE
13 years 7 months ago
Parallel Best Neighborhood Matching Algorithm Implementation on GPU Platform
—Error concealment restores the visual integrity of image content that has been damaged due to a bad network transmission. Best neighborhood matching (BNM) is an effective image ...
Guangyong Zhang, Liqiang He, Yanyan Zhang
IEEECIT
2010
IEEE
13 years 7 months ago
The Strategy of Advancing Mobile Web Application's Layout and Drawing
As the time of mobile Internet has come gently, the mobile applications has progressively designed by techniques based on web technology. The web technology has a lot of strong po...
Liankui Qiu, Panlong He, Lei Luo
IEEECIT
2010
IEEE
13 years 7 months ago
CFCSS without Aliasing for SPARC Architecture
With the increasing popularity of COTS (commercial off the shelf) components and multi-core processor in space and aviation applications, software fault tolerance becomes attracti...
Chao Wang, Zhongchuan Fu, Hongsong Chen, Wei Ba, B...