Sciweavers

18374 search results - page 90 / 3675
» Applications for data hiding
Sort
View
148
Voted
NAACL
2010
15 years 3 months ago
Linguistic Steganography Using Automatically Generated Paraphrases
This paper describes a method for checking the acceptability of paraphrases in context. We use the Google n-gram data and a CCG parser to certify the paraphrasing grammaticality a...
Ching-Yun Chang, Stephen Clark
CN
2006
79views more  CN 2006»
15 years 5 months ago
Understanding when location-hiding using overlay networks is feasible
Overlay networks (proxy networks) have been used as a communication infrastructure to allow applications to communicate with users without revealing their IP addresses. Such proxy...
Ju Wang, Andrew A. Chien
MLDM
2007
Springer
15 years 11 months ago
Mining Frequent Trajectories of Moving Objects for Location Prediction
Advances in wireless and mobile technology flood us with amounts of moving object data that preclude all means of manual data processing. The volume of data gathered from position...
Mikolaj Morzy