Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
A multiple representation database contains several geographic datasets defined at different resolutions covering the same area. Objects within the different datasets that repre...
Classically, software deployment is a process consisting of building the software, packaging it for distribution, and installing it at the target site. This approach has two proble...
We present a technique for computing approximately optimal solutions to stochastic resource allocation problems modeled as Markov decision processes (MDPs). We exploit two key pro...
Nicolas Meuleau, Milos Hauskrecht, Kee-Eung Kim, L...
The Remote Agent Experiment (RAX) on the Deep Space 1 (DS1) mission was the first time that an artificially intelligent agent controlled a NASA spacecraft. One of the key componen...
Benjamin D. Smith, Martin S. Feather, Nicola Musce...