Sciweavers

1441 search results - page 136 / 289
» A Practical Approach to Network-Based Processing
Sort
View
84
Voted
ICASSP
2009
IEEE
15 years 7 months ago
Rate-constrained distributed distance testing and its applications
We investigate a practical approach to solving one instantiation of a distributed hypothesis testing problem under severe rate constraints that shows up in a wide variety of appli...
Chuohao Yeo, Parvez Ahammad, Hao Zhang, Kannan Ram...
94
Voted
ICIP
2006
IEEE
16 years 2 months ago
Provably Secure Steganography: Achieving Zero K-L Divergence using Statistical Restoration
In this paper, we present a framework for the design of steganographic schemes that can provide provable security by achieving zero Kullback-Leibler divergence between the cover a...
Kaushal Solanki, Kenneth Sullivan, Upamanyu Madhow...
94
Voted
WWW
2009
ACM
16 years 1 months ago
Online expansion of rare queries for sponsored search
Sponsored search systems are tasked with matching queries to relevant advertisements. The current state-of-the-art matching algorithms expand the user's query using a variety...
Andrei Z. Broder, Peter Ciccolo, Evgeniy Gabrilovi...
EDBT
2008
ACM
188views Database» more  EDBT 2008»
16 years 20 days ago
FAME-DBMS: Tailor-made Data Management Solutions for Embedded Systems
Data management functionality is not only needed in large-scale server systems, but also in embedded systems. Resource restrictions and heterogeneity of hardware, however, complic...
Marko Rosenmüller, Norbert Siegmund, Horst Sc...
80
Voted
RAID
2007
Springer
15 years 6 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...