Sciweavers

660 search results - page 126 / 132
» Improving AOR method for consistent linear systems
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 9 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
86
Voted
ECCC
2010
98views more  ECCC 2010»
14 years 8 months ago
Verifying Computations with Streaming Interactive Proofs
Applications based on outsourcing computation require guarantees to the data owner that the desired computation has been performed correctly by the service provider. Methods based...
Graham Cormode, Justin Thaler, Ke Yi
BSN
2009
IEEE
149views Sensor Networks» more  BSN 2009»
15 years 4 months ago
Optimizing Interval Training Protocols Using Data Mining Decision Trees
— Interval training consists of interl intensity exercises with rest periods. This training well known exercise protocol which helps stre improve one’s cardiovascular fitness. ...
Myung-kyung Suh, Mahsan Rofouei, Ani Nahapetian, W...
MICAI
2005
Springer
15 years 2 months ago
Agent-Based Simulation Replication: A Model Driven Architecture Approach
In Multi-agent based simulation (MABS) systems, computational models are built as multi-agent systems (MAS). Replication of these models can contribute to improve the reliability o...
Candelaria Sansores, Juan Pavón
75
Voted
SIGIR
2008
ACM
14 years 9 months ago
Asymmetric distance estimation with sketches for similarity search in high-dimensional spaces
Efficient similarity search in high-dimensional spaces is important to content-based retrieval systems. Recent studies have shown that sketches can effectively approximate L1 dist...
Wei Dong, Moses Charikar, Kai Li