Sciweavers

1407 search results - page 98 / 282
» Cognition without content
Sort
View
73
Voted
ICC
2000
IEEE
15 years 5 months ago
Floating Signal Constellations for Multimedia Steganography
Abstract- Conventional spread spectrum communication methods essentially map a discrete symbol from an alphabet to a length-N real valued sequence, which represents a point in the ...
Mahalingam Ramkumar, Ali N. Akansu, Xiaodong Cai
102
Voted
PODC
2010
ACM
15 years 4 months ago
Brief announcement: on enhancing concurrency in distributed transactional memory
Distributed transactional memory (TM) models based on globally-consistent contention management policies may abort many transactions that could potentially commit without violatin...
Bo Zhang, Binoy Ravindran
ASPDAC
2004
ACM
103views Hardware» more  ASPDAC 2004»
15 years 4 months ago
Design and implementation of a secret key steganographic micro-architecture employing FPGA
In the well-known "prisoners' problem", a representative example of steganography, two persons attempt to communicate covertly without alerting the warden. One appr...
Hala A. Farouk, Magdy Saeb
72
Voted
CIE
2008
Springer
15 years 2 months ago
An Enhanced Theory of Infinite Time Register Machines
Abstract. Infinite time register machines (ITRMs) are register machines which act on natural numbers and which are allowed to run for arbitrarily many ordinal steps. Successor step...
Peter Koepke, Russell Miller
61
Voted
HCI
2007
15 years 2 months ago
Measuring the Screen Complexity of Web Pages
An increasing, degree of rich and dynamic content and abundant links are making Web pages visually cluttered. This paper presents a numerical tool to evaluate the screen complexity...
Fong-Ling Fu, Shao-Yuan Chiu, Chiu Hung Su