Sciweavers

1088 search results - page 155 / 218
» Independence of Negative Constraints
Sort
View
CORR
2007
Springer
86views Education» more  CORR 2007»
14 years 9 months ago
Variations on Information Embedding in Multiple Access and Broadcast Channels
Information embedding (IE) is the transmission of information within a host signal subject to a distortion constraint. There are two types of embedding methods, namely irreversibl...
Shivaprasad Kotagiri, J. Nicholas Laneman
JMIV
2000
141views more  JMIV 2000»
14 years 9 months ago
Critical Motions for Auto-Calibration When Some Intrinsic Parameters Can Vary
Auto-calibration is the recovery of the full camera geometry and Euclidean scene structure from several images of an unknown 3D scene, using rigidity constraints and partial knowl...
Fredrik Kahl, Bill Triggs, Kalle Åström
ISSRE
2010
IEEE
14 years 8 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
CORR
2011
Springer
159views Education» more  CORR 2011»
14 years 4 months ago
How to Play Unique Games against a Semi-Random Adversary
In this paper, we study the average case complexity of the Unique Games problem. We propose a natural semi-random model, in which a unique game instance is generated in several st...
Alexandra Kolla, Konstantin Makarychev, Yury Makar...
POPL
2012
ACM
13 years 5 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama