Sciweavers

53 search results - page 3 / 11
» A Framework for Identifying Textual Redundancy
Sort
View
ICISC
2004
122views Cryptology» more  ICISC 2004»
13 years 7 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...
SIGCOMM
2009
ACM
14 years 23 days ago
SmartRE: an architecture for coordinated network-wide redundancy elimination
Application-independent Redundancy Elimination (RE), or identifying and removing repeated content from network transfers, has been used with great success for improving network pe...
Ashok Anand, Vyas Sekar, Aditya Akella
ICMCS
2000
IEEE
183views Multimedia» more  ICMCS 2000»
13 years 10 months ago
Broadcast News Parsing using Visual Cues: A Robust Face Detection Approach
: Automatic content-based analysis and indexing of broadcast news recordings or digitized news archives is becoming an important tool in the framework of many multimedia interactiv...
Yannis S. Avrithis, Nicolas Tsapatsoulis, Stefanos...
ACL
2011
12 years 10 months ago
Learning to Win by Reading Manuals in a Monte-Carlo Framework
This paper presents a novel approach for leveraging automatically extracted textual knowledge to improve the performance of control applications such as games. Our ultimate goal i...
S. R. K. Branavan, David Silver, Regina Barzilay
ISCA
2000
IEEE
99views Hardware» more  ISCA 2000»
13 years 10 months ago
Transient fault detection via simultaneous multithreading
Smaller feature sizes, reduced voltage levels, higher transistor counts, and reduced noise margins make future generations of microprocessors increasingly prone to transient hardw...
Steven K. Reinhardt, Shubhendu S. Mukherjee