Sciweavers

652 search results - page 125 / 131
» Deriving Specifications of Dependable Systems: toward a Meth...
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 9 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
CISS
2008
IEEE
15 years 4 months ago
Compressed channel sensing
—Reliable wireless communications often requires accurate knowledge of the underlying multipath channel. This typically involves probing of the channel with a known training wave...
Waheed Uz Zaman Bajwa, Jarvis Haupt, Gil M. Raz, R...
ICPP
2007
IEEE
15 years 4 months ago
RECN-IQ: A Cost-Effective Input-Queued Switch Architecture with Congestion Management
As the number of computing and storage nodes keeps increasing, the interconnection network is becoming a key element of many computing and communication systems, where the overall...
Gaspar Mora, Pedro Javier García, Jose Flic...
ICIP
2003
IEEE
15 years 3 months ago
Inter-camera color calibration by correlation model function
We present a novel solution to the inter-camera color calibration problem, which is very important for multi-camera systems. We propose a distance metric and a model function to e...
Fatih Murat Porikli
JUCS
2008
148views more  JUCS 2008»
14 years 9 months ago
An Optimization of CDN Using Efficient Load Distribution and RADS Caching Algorithm
: Nowadays, while large-sized multimedia objects are becoming very popular throughout the Internet, one of the important issues appears to be the acceleration of content delivery n...
Yun Ji Na, Sarvar R. Abdullaev, Franz I. S. Ko