Search

Your search keyword '"*SCHEME programming language"' showing total 27 results

Search Constraints

Start Over You searched for: Descriptor "*SCHEME programming language" Remove constraint Descriptor: "*SCHEME programming language" Topic data analysis Remove constraint Topic: data analysis Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
27 results on '"*SCHEME programming language"'

Search Results

1. Communication-efficient outsourced privacy-preserving classification service using trusted processor.

2. High payload reversible data hiding scheme using weighted matrix.

3. Pattern set mining with schema-based constraint.

4. Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode.

5. Realizing secret sharing with general access structure.

6. A combined canonical variate analysis and Fisher discriminant analysis (CVA–FDA) approach for fault diagnosis.

7. Non-causal data-driven monitoring of the process correlation structure: A comparison study with new methods.

8. Statistical computation of feature weighting schemes through data estimation for nearest neighbor classifiers.

9. A data hiding scheme based upon DCT coefficient modification.

10. A simple boundary reinforcement technique for segmentation.

11. Exploiting Universum data in AdaBoost using gradient descent.

12. Output consensus of networked multi-agent systems with time-delay compensation scheme.

13. Secure and efficient privacy-preserving public auditing scheme for cloud storage.

14. Improving experimental studies about ensembles of classifiers for bankruptcy prediction and credit scoring.

15. Writer identification using oriented Basic Image Features and the Delta encoding.

16. Privacy-preserving kriging interpolation on partitioned data.

17. Biased sink mobility with adaptive stop times for low latency data collection in sensor networks.

18. Data-Enabled Design and Optimization (DEDOpt): Tall steel building frameworks.

19. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.

20. DML and ILO based clock recovery scheme for burst-mode 4-PAM optical data transmission in PON

21. Digital video steganalysis based on motion vector statistical characteristics

22. Verifiable multi-secret sharing based on LFSR sequences

23. A comparative analysis of performance improvement schemes for cache memories

24. A framework for multidimensional design of data warehouses from ontologies

25. A fault-tolerant scheme for an autonomous local wireless sensor network

26. On security of a certificateless signcryption scheme

27. MUD: Mapping-based query processing for high-dimensional uncertain data

Catalog

Books, media, physical & digital resources