Sciweavers

10296 search results - page 107 / 2060
» Distribution of Mutual Information
Sort
View
116
Voted
PODC
2010
ACM
15 years 27 days ago
The k-bakery: local-spin k-exclusion using non-atomic reads and writes
Mutual exclusion is used to coordinate access to shared resources by concurrent processes. k-Exclusion is a variant of mutual exclusion in which up to k processes can simultaneous...
Robert Danek
COLING
2010
14 years 7 months ago
Learning Web Query Patterns for Imitating Wikipedia Articles
This paper presents a novel method for acquiring a set of query patterns to retrieve documents containing important information about an entity. Given an existing Wikipedia catego...
Shohei Tanaka, Naoaki Okazaki, Mitsuru Ishizuka
127
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage
A rechargeable battery may be used to partially protect the privacy of information contained in a household’s electrical load profile. We represent the system as a finite stat...
David P. Varodayan, Ashish Khisti
75
Voted
ICASSP
2008
IEEE
15 years 7 months ago
Cryptographic measures in information hiding
Recent information hiding schemes are scrutinized in terms of their cryptographic performance. We establish conditions under which the key equivocation function is optimal for the...
Phillip A. Regalia
100
Voted
ICIP
2004
IEEE
16 years 2 months ago
An information theoretic framework for image segmentation
In this paper, an information theoretic framework for image segmentation is presented. This approach is based on the information channel that goes from the image intensity histogr...
Jaume Rigau, Miquel Feixas, Mateu Sbert