Sciweavers

10 search results - page 2 / 2
» Reliability Markov Chains for Security Data Transmitter Anal...
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 5 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
ICPADS
2002
IEEE
13 years 10 months ago
Design and Analysis of a Fault-Tolerant Mechanism for a Server-Less Video-On-Demand System
Video-on-demand (VoD) systems have traditionally been built on the client-server architecture, where a video server stores, retrieves, and transmits video data to video clients fo...
Jack Y. B. Lee, Raymond W. T. Leung
ISI
2008
Springer
13 years 5 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
VTC
2010
IEEE
163views Communications» more  VTC 2010»
13 years 3 months ago
An ARQ Mechanism with Rate Control for Two-Hop Relaying Systems
— Wireless multi-hop relaying has been attracting considerable attention as a promising technique for future communication systems. The multi-hop relaying technique has many bene...
Soo-Yong Jeon, Dong-Ho Cho
BMCBI
2008
132views more  BMCBI 2008»
13 years 5 months ago
The SeqWord Genome Browser: an online tool for the identification and visualization of atypical regions of bacterial genomes thr
Background: Data mining in large DNA sequences is a major challenge in microbial genomics and bioinformatics. Oligonucleotide usage (OU) patterns provide a wealth of information f...
Hamilton Ganesan, Anna S. Rakitianskaia, Colin F. ...