Sciweavers

1578 search results - page 216 / 316
» Induction of Stable Models
Sort
View
97
Voted
SSWMC
2004
15 years 2 months ago
On estimation of secret message length in LSB steganography in spatial domain
In this paper, we present a new method for estimating the secret message length of bit-streams embedded using the Least Significant Bit embedding (LSB) at random pixel positions. ...
Jessica J. Fridrich, Miroslav Goljan
118
Voted
TREC
2007
15 years 1 months ago
CSIR at TREC 2007 Expert Search Task
This is the second year for the participation of Center for Studies of Information Resources (CSIR) in the TREC Expert Search Task. Rather than using the candidate profile based ap...
Jiepu Jiang, Wei Lu, Dan Liu
73
Voted
ICMCS
2010
IEEE
152views Multimedia» more  ICMCS 2010»
15 years 1 months ago
Bipolar grouping
Most affinity-based grouping methods only model the inclusive relation among the data. When the data set contains a significant amount of noise data that should not be included in...
Jiang Xu, Junsong Yuan, Ying Wu
87
Voted
AMC
2007
110views more  AMC 2007»
15 years 25 days ago
Pest regulation by means of impulsive controls
In this paper, we consider an integrated pest management model which is impulsively controlled by means of biological and chemical controls. These controls are assumed to act in a...
Paul Georgescu, Gheorghe Morosanu
86
Voted
AUTOMATICA
2007
142views more  AUTOMATICA 2007»
15 years 25 days ago
Supervisory control using a new control-relevant switching
This paper presents a new supervisory control scheme, which is based on a control-relevant switching logic. Unlike most of the existing switching methods considering only estimato...
Tae-Woong Yoon, Jung-Su Kim, A. Stephen Morse