Sciweavers

666 search results - page 58 / 134
» Fair watermarking techniques
Sort
View
ICASSP
2010
IEEE
14 years 10 months ago
Informed source separation of underdetermined instantaneous stereo mixtures using source index embedding
In this paper, we address the issue of underdetermined source separation of non-stationary audio sources from a stereo (i.e. 2-channel) linear instantaneous mixture. This problem ...
Mathieu Parvaix, Laurent Girin
KDD
2003
ACM
113views Data Mining» more  KDD 2003»
15 years 10 months ago
Using randomized response techniques for privacy-preserving data mining
Privacy is an important issue in data mining and knowledge discovery. In this paper, we propose to use the randomized response techniques to conduct the data mining computation. S...
Wenliang Du, Zhijun Zhan
ISORC
2006
IEEE
15 years 4 months ago
Load Balancing Techniques for Distributed Stream Processing Applications in Overlay Environments
Service overlays that support distributed stream processing applications are increasingly being deployed in wide-area environments. The inherent heterogeneous, dynamic and large-s...
Yannis Drougas, Thomas Repantis, Vana Kalogeraki
JNW
2007
88views more  JNW 2007»
14 years 9 months ago
Integrated Proactive Admission Control Technique For both UDP And TCP Traffic Flows
—Real time traffic adopting UDP at the transport layer needs some quality of service. It is offered through an admission control scheme. This paper adopts one such scheme which i...
Lakshmanan Senthilkumar, Venkadachalam Sankaranara...
ISW
2005
Springer
15 years 3 months ago
Towards Better Software Tamper Resistance
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, s...
Hongxia Jin, Ginger Myles, Jeffery Lotspiech