Sciweavers

5153 search results - page 310 / 1031
» Introduction to Randomized Algorithms
Sort
View
KES
2005
Springer
15 years 9 months ago
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack
Abstract. Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random...
Xinpeng Zhang, Shuozhong Wang
ISCIS
2003
Springer
15 years 9 months ago
A Video Watermarking Algorithm Based on the Human Visual System Properties
Abstract. In this paper, we propose a new video watermarking algorithm based on the human visual system (HVS) properties to find effective locations in video sequences for robust ...
Ji-Young Moon, Yo-Sung Ho
GECCO
2006
Springer
165views Optimization» more  GECCO 2006»
15 years 7 months ago
Evolving musical performance profiles using genetic algorithms with structural fitness
This paper presents a system that uses Genetic Algorithm (GA) to evolve hierarchical pulse sets (i.e., hierarchical duration vs. amplitude matrices) for expressive music performan...
Qijun Zhang, Eduardo Reck Miranda
EUROPAR
2008
Springer
15 years 5 months ago
Deque-Free Work-Optimal Parallel STL Algorithms
This paper presents provable work-optimal parallelizations of STL (Standard Template Library) algorithms based on the workstealing technique. Unlike previous approaches where a deq...
Daouda Traoré, Jean-Louis Roch, Nicolas Mai...
DAGSTUHL
2007
15 years 5 months ago
Weighted Voronoi Region Algorithms for Political Districting
Automated political districting shares with electronic voting the aim of preventing electoral manipulation and pursuing an impartial electoral mechanism. Political districting can...
Bruno Simeone, Federica Ricca, Andrea Scozzari