Sciweavers

2623 search results - page 422 / 525
» Conceptual Application Domain Modelling
Sort
View
TCSV
2008
124views more  TCSV 2008»
15 years 3 months ago
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion
Look-up table (LUT)-based data hiding is a simple and efficient technique to hide secondary information (watermark) into multimedia work for various applications such as copyright ...
Xiao-Ping Zhang, Kan Li, Xiaofeng Wang
129
Voted
CN
2004
138views more  CN 2004»
15 years 3 months ago
Performance evaluation of prioritized scheduling with buffer management for differentiated services architectures
Differentiated services (DiffServ) is an architecture for the Internet in which various applications are supported using a simple classification scheme. Packets entering the DiffS...
Ahmed E. Kamal, Hossam S. Hassanein
JASSS
2002
68views more  JASSS 2002»
15 years 3 months ago
Group Reputation Supports Beneficent Norms
This paper demonstrates the role of group normative reputation in the promotion of an aggression reducing possession norm in an artificial society. A previous model of normative r...
David Hales
151
Voted
DATAMINE
1999
81views more  DATAMINE 1999»
15 years 3 months ago
The Role of Occam's Razor in Knowledge Discovery
Many KDD systems incorporate an implicit or explicit preference for simpler models, but this use of "Occam's razor" has been strongly criticized by several authors (...
Pedro Domingos
WSDM
2012
ACM
245views Data Mining» more  WSDM 2012»
13 years 11 months ago
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
In this work we propose a novel approach to anomaly detection in streaming communication data. We first build a stochastic model for the system based on temporal communication pa...
Brian Thompson