Sciweavers

9572 search results - page 116 / 1915
» Cover Algorithms and Their Combination
Sort
View
ISCAS
2008
IEEE
183views Hardware» more  ISCAS 2008»
15 years 11 months ago
Optimal rate allocation for scalable video multicast over WiMAX
—The IEEE 802.16 standard (commonly known as WiMAX), which has been proposed as a new wireless broadband standard, is capable of delivering very high data rate and covering wide ...
Hsin-Yu Chi, Chia-Wen Lin, Yung-Chang Chen, Chih-M...
ICDM
2007
IEEE
96views Data Mining» more  ICDM 2007»
15 years 11 months ago
The Chosen Few: On Identifying Valuable Patterns
Constrained pattern mining extracts patterns based on their individual merit. Usually this results in far more patterns than a human expert or a machine learning technique could m...
Björn Bringmann, Albrecht Zimmermann
GECCO
2007
Springer
161views Optimization» more  GECCO 2007»
15 years 11 months ago
Alternative techniques to solve hard multi-objective optimization problems
In this paper, we propose the combination of different optimization techniques in order to solve “hard” two- and threeobjective optimization problems at a relatively low comp...
Ricardo Landa Becerra, Carlos A. Coello Coello, Al...
ICDT
2007
ACM
107views Database» more  ICDT 2007»
15 years 11 months ago
Privacy in GLAV Information Integration
Abstract. We define and study formal privacy guarantees for information integration systems, where sources are related to a public schema by mappings given by source-to-target dep...
Alan Nash, Alin Deutsch
143
Voted
MMSEC
2006
ACM
148views Multimedia» more  MMSEC 2006»
15 years 11 months ago
Minimizing the embedding impact in steganography
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Jessica J. Fridrich