Sciweavers

1053 search results - page 176 / 211
» Improving the SLA Algorithm Using Association Rules
Sort
View
MMSEC
2006
ACM
148views Multimedia» more  MMSEC 2006»
15 years 6 months ago
Minimizing the embedding impact in steganography
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Jessica J. Fridrich
101
Voted
SIGMOD
2008
ACM
100views Database» more  SIGMOD 2008»
15 years 12 days ago
Incorporating string transformations in record matching
Today's record matching infrastructure does not allow a flexible way to account for synonyms such as "Robert" and "Bob" which refer to the same name, and ...
Arvind Arasu, Surajit Chaudhuri, Kris Ganjam, Ragh...
130
Voted
CPAIOR
2010
Springer
14 years 11 months ago
Boosting Set Constraint Propagation for Network Design
Abstract. This paper reconsiders the deployment of synchronous optical networks (SONET), an optimization problem naturally expressed in terms of set variables. Earlier approaches, ...
Justin Yip, Pascal Van Hentenryck, Carmen Gervet
SMA
2003
ACM
163views Solid Modeling» more  SMA 2003»
15 years 5 months ago
Fast swept volume approximation of complex polyhedral models
We present an efficient algorithm to approximate the swept volume (SV) of a complex polyhedron along a given trajectory. Given the boundary description of the polyhedron and a pat...
Young J. Kim, Gokul Varadhan, Ming C. Lin, Dinesh ...
107
Voted
VLSISP
2008
100views more  VLSISP 2008»
15 years 11 days ago
Memory-constrained Block Processing for DSP Software Optimization
Digital signal processing (DSP) applications involve processing long streams of input data. It is important to take into account this form of processing when implementing embedded ...
Ming-Yung Ko, Chung-Ching Shen, Shuvra S. Bhattach...