Page 1

Displaying 1 – 14 of 14

Showing per page

Picture languages in automatic radiological palm interpretation

Ryszard Tadeusiewicz, Marek Ogiela (2005)

International Journal of Applied Mathematics and Computer Science

The paper presents a new technique for cognitive analysis and recognition of pathological wrist bone lesions. This method uses AI techniques and mathematical linguistics allowing us to automatically evaluate the structure of the said bones, based on palm radiological images. Possibilities of computer interpretation of selected images, based on the methodology of automatic medical image understanding, as introduced by the authors, were created owing to the introduction of an original relational description...

Polypodic codes

Symeon Bozapalidis, Olympia Louscou-Bozapalidou (2002)

RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications

Word and tree codes are studied in a common framework, that of polypodes which are sets endowed with a substitution like operation. Many examples are given and basic properties are examined. The code decomposition theorem is valid in this general setup.

Polypodic codes

Symeon Bozapalidis, Olympia Louscou–Bozapalidou (2010)

RAIRO - Theoretical Informatics and Applications

Word and tree codes are studied in a common framework, that of polypodes which are sets endowed with a substitution like operation. Many examples are given and basic properties are examined. The code decomposition theorem is valid in this general setup.

Privacy homomorphisms for statistical confidentiality.

Josep Domingo i Ferrer (1996)

Qüestiió

When publishing contingency tables which contain official statistics, a need to preserve statistical confidentiality arises. Statistical disclosure of individual units must be prevented. There is a wide choice of techniques to achieve this anonymization: cell supression, cell perturbation, etc. In this paper, we tackle the problem of using anonymized data to compute exact statistics; our approach is based on privacy homomorphisms, which are encryption transformations such that the decryption of...

Currently displaying 1 – 14 of 14

Page 1