Sciweavers

9370 search results - page 146 / 1874
» An Abstract Notion of Application
Sort
View
77
Voted
IH
1999
Springer
15 years 5 months ago
Robust Object Watermarking: Application to Code
In this paper, we focus on a step of the watermarking process whose importance has been disregarded so far. In this perspective, we introduce the vector extraction paradigm which i...
Julien P. Stern, Gaël Hachez, François...
CORR
2007
Springer
117views Education» more  CORR 2007»
15 years 24 days ago
A Geometric Interpretation of Fading in Wireless Networks: Theory and Applications
Abstract—In wireless networks with random node distribution, the underlying point process model and the channel fading process are usually considered separately. A unified frame...
Martin Haenggi
84
Voted
SPW
1997
Springer
15 years 5 months ago
Protocols Using Anonymous Connections: Mobile Applications
This paper describes security protocols that use anonymous channels as primitive, much in the way that key distribution protocols ryption as primitive. This abstraction allows us t...
Michael G. Reed, Paul F. Syverson, David M. Goldsc...
95
Voted
DSD
2009
IEEE
106views Hardware» more  DSD 2009»
15 years 4 months ago
Model-Driven Design of Embedded Multimedia Applications on SoCs
This paper addresses the design issue of System-onelevating the design abstraction levels, through a model-driven approach. It considers the standard Marte profile, which is dedic...
Adolf Abdallah, Abdoulaye Gamatié, Jean-Luc...
ALT
2009
Springer
15 years 9 months ago
Pure Exploration in Multi-armed Bandits Problems
Abstract. We consider the framework of stochastic multi-armed bandit problems and study the possibilities and limitations of strategies that explore sequentially the arms. The stra...
Sébastien Bubeck, Rémi Munos, Gilles...