Optimal Morphological Pattern Restoration from Noisy Binary Images
IEEE Transactions on Pattern Analysis and Machine Intelligence
Performance and stability of communication networks via robust exponential bounds
IEEE/ACM Transactions on Networking (TON)
Mutual information, Fisher information, and population coding
Neural Computation
Mining patterns in long sequential data with noise
ACM SIGKDD Explorations Newsletter - Special issue on “Scalable data mining algorithms”
Infominer: mining surprising periodic patterns
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Viewpoint entropy: a new tool for obtaining good views of molecules
VISSYM '02 Proceedings of the symposium on Data Visualisation 2002
Multidimensional signal compression using multiscale recurrent patterns
Signal Processing - Image and Video Coding beyond Standards
An Information Theoretic Approach to Rule Induction from Databases
IEEE Transactions on Knowledge and Data Engineering
An Efficient Inductive Learning Method for Object-Oriented Database Using Attribute Entropy
IEEE Transactions on Knowledge and Data Engineering
Flow Diagrams of the Quadratic Neural Network
ICANN '02 Proceedings of the International Conference on Artificial Neural Networks
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Information-Theoretic Cryptography
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Protocols for Secret Key Agreement by Public Discussion Based on Common Information
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Indistinguishability of Random Systems
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Unconditional Security in Cryptography
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Statistical Analysis of the Alleged RC4 Keystream Generator
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Discovering informative content blocks from Web documents
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Comparing Bayes model averaging and stacking when model approximation error cannot be ignored
The Journal of Machine Learning Research
A probabilistic approach to compound noun indexing in Korean texts
COLING '96 Proceedings of the 16th conference on Computational linguistics - Volume 1
Mining Surprising Periodic Patterns
Data Mining and Knowledge Discovery
An information-theoretic model for steganography
Information and Computation
Future Generation Computer Systems - Special issue: Computer graphics and geometric modeling
Sensor management using an active sensing approach
Signal Processing
A Robust Information Clustering Algorithm
Neural Computation
Metabolically Efficient Information Processing
Neural Computation
Information-theoretic analysis of steganalysis in real images
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Information-theoretic assessment of multi-dimensional signals
Signal Processing - Special issue: Information theoretic signal processing
Toward a theory of information processing
Signal Processing
A Method for Selecting the Bin Size of a Time Histogram
Neural Computation
EURASIP Journal on Applied Signal Processing
A new channel coding algorithm based on phosphorylation/dephosphorylation-proteins and GTPases
Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems
Computer Vision and Image Understanding
Bayesian estimates in cryptography
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Reliability criteria in information theory and in statistical hypothesis testing
Foundations and Trends in Communications and Information Theory
The Shannon Entropy-Based Node Placement for Enrichment and Simplification of Meshes
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part II
Redundancy versus video and audio human perception
WSEAS TRANSACTIONS on COMMUNICATIONS
Expert Systems with Applications: An International Journal
Improved Adaptive Spatial Information Clustering for Image Segmentation
ISVC '08 Proceedings of the 4th International Symposium on Advances in Visual Computing
Expert Systems with Applications: An International Journal
Protection of Sensitive Security Parameters in Integrated Circuits
Mathematical Methods in Computer Science
Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools
Adaptive spatial information-theoretic clustering for image segmentation
Pattern Recognition
Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments
IEEE/ACM Transactions on Networking (TON)
On convergence properties of Shannon entropy
Problems of Information Transmission
Video and audio compressions and human perception mechanism
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
A hypothesis testing approach to semifragile watermark-based authentication
IEEE Transactions on Information Forensics and Security
Technical Section: Realtime automatic selection of good molecular views
Computers and Graphics
IEEE Transactions on Image Processing
IEEE Transactions on Wireless Communications
IEEE Transactions on Image Processing
Finite state channels with time-invariant deterministic feedback
IEEE Transactions on Information Theory
Reliable communication in the absence of a common clock
IEEE Transactions on Information Theory
A coding theorem for cheating-detectable (2, 2)-threshold blockwise secret sharing schemes
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Future Generation Computer Systems
Speech watermarking for analog flat-fading bandpass channels
IEEE Transactions on Audio, Speech, and Language Processing
Information-theoretically secure secret-key agreement by NOT authenticated public discussion
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Unconditionally secure homomorphic pre-distributed commitments
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Perception-based illumination information measurement and light source placement
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartIII
An information-theoretic fuzzy C-spherical shells clustering algorithm
Fuzzy Sets and Systems
Information rates of the noncoherent frequency selective fading channel
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
A mathematical theory of energy efficient neural computation and communication
IEEE Transactions on Information Theory - Special issue on information theory in molecular biology and neuroscience
Group codes outperform binary-coset codes on nonbinary symmetric memoryless channels
IEEE Transactions on Information Theory
Refining decisions after losing data: the unlucky broker problem
IEEE Transactions on Signal Processing
A pragmatic approach to cooperative communication
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Early-elimination modification for priority-first search decoding
IEEE Transactions on Communications
High-level secured signature scheme
MMACTEE'09 Proceedings of the 11th WSEAS international conference on Mathematical methods and computational techniques in electrical engineering
Iterative demodulation and decoding of coded non-square QAM
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
VLSI systolic binary tree-searched vector quantizer for image compression
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Information transmission and steganography
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Adaptive sampling for monte carlo global illumination using tsallis entropy
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Clustering spherical shells by a mini-max information algorithm
ACCV'06 Proceedings of the 7th Asian conference on Computer Vision - Volume Part II
Adaptive thresholds for layered neural networks with synaptic noise
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part I
Predicting and distinguishing attacks on RC4 keystream generator
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
AMR'08 Proceedings of the 6th international conference on Adaptive Multimedia Retrieval: identifying, Summarizing, and Recommending Image and Music
On logarithmically asymptotically optimal testing of hypotheses and identification
General Theory of Information Transfer and Combinatorics
Bias phenomenon and compensation in multiple target tracking algorithms
Mathematical and Computer Modelling: An International Journal
Information theory tools for scene discretization
EGWR'99 Proceedings of the 10th Eurographics conference on Rendering
Viewpoint selection for intervention planning
EUROVIS'07 Proceedings of the 9th Joint Eurographics / IEEE VGTC conference on Visualization
A novel unsupervised approach for multilevel image clustering from unordered image collection
Frontiers of Computer Science: Selected Publications from Chinese Universities
Multiple objects: error exponents in hypotheses testing and identification
Information Theory, Combinatorics, and Search Theory
Hi-index | 0.19 |