Sciweavers

2863 search results - page 184 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
137
Voted
JVM
2001
99views Education» more  JVM 2001»
15 years 5 months ago
JVM Susceptibility to Memory Errors
Modern computer systems are becoming more powerful and are using larger memories. However, except for very high end systems, little attention is being paid to high availability. T...
DeQing Chen, Alan Messer, Philippe Bernadat, Guang...
ICMCS
2005
IEEE
111views Multimedia» more  ICMCS 2005»
15 years 9 months ago
An audio spread-spectrum data hiding system with an informed embedding strategy adapted to a Wiener filtering based receiver
A particular application of audio data hiding systems and watermarking systems consists of using the audio signal as a transmission channel for binary information. The system shou...
Cléo Baras, Nicolas Moreau
130
Voted
IWDW
2009
Springer
15 years 10 months ago
Estimating the Information Theoretic Optimal Stego Noise
We recently developed a new benchmark for steganography, underpinned by the square root law of capacity, called Steganographic Fisher Information (SFI). It is related to the multip...
Andrew D. Ker
157
Voted
IJON
2006
109views more  IJON 2006»
15 years 3 months ago
Integrating the improved CBP model with kernel SOM
In this paper, we first design a more generalized network model, Improved CBP, based on the same structure as Circular BackPropagation (CBP) proposed by Ridella et al. The novelty ...
Qun Dai, Songcan Chen
138
Voted
MVA
1998
118views Computer Vision» more  MVA 1998»
15 years 5 months ago
Integrated Vision/Control System for Autonomous Planetary Rovers
Current NASA plans call for extended year-long, multikilometer treks for the 2003 and 2005 Mars missions. A much greater amount of rover autonomy is required compared to the recen...
Terry Huntsberger, Toshiro Kubota, John Rose