Sciweavers

3370 search results - page 225 / 674
» Correlation Embedding Analysis
Sort
View
TIFS
2008
152views more  TIFS 2008»
15 years 4 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
DATE
2008
IEEE
106views Hardware» more  DATE 2008»
15 years 10 months ago
Modeling Event Stream Hierarchies with Hierarchical Event Models
Compositional Scheduling Analysis couples local scheduling analysis via event streams. While local analysis has successfully been extended to include hierarchical scheduling strat...
Jonas Rox, Rolf Ernst
ISOLA
2010
Springer
15 years 2 months ago
A Scalable Approach for the Description of Dependencies in Hard Real-Time Systems
During the design iterations of embedded systems, the schedulability analysis is an important method to verify whether the real-time constraints are satisfied. In order to achieve...
Steffen Kollmann, Victor Pollex, Kilian Kempf, Fra...
PKDD
2007
Springer
131views Data Mining» more  PKDD 2007»
15 years 10 months ago
Expectation Propagation for Rating Players in Sports Competitions
Abstract. Rating players in sports competitions based on game results is one example of paired comparison data analysis. Since an exact Bayesian treatment is intractable, several t...
Adriana Birlutiu, Tom Heskes
DSOM
2003
Springer
15 years 9 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...