Sciweavers

3373 search results - page 296 / 675
» Linear transformations on codes
Sort
View
EMNLP
2010
15 years 2 months ago
Practical Linguistic Steganography Using Contextual Synonym Substitution and Vertex Colour Coding
Linguistic Steganography is concerned with hiding information in natural language text. One of the major transformations used in Linguistic Steganography is synonym substitution. ...
Ching-Yun Chang, Stephen Clark
144
Voted
EUROSYS
2011
ACM
14 years 8 months ago
Symbolic crosschecking of floating-point and SIMD code
We present an effective technique for crosschecking an IEEE 754 floating-point program and its SIMD-vectorized version, implemented in KLEE-FP, an extension to the KLEE symbolic ...
Peter Collingbourne, Cristian Cadar, Paul H. J. Ke...
CRYPTO
2000
Springer
277views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications
The best known constructions for arrays with low bias are those from [1] and the exponential sum method based on the WeilCarlitz-Uchiyama bound. They all yield essentially the same...
Jürgen Bierbrauer, Holger Schellwat
ICIP
1999
IEEE
16 years 6 months ago
An Algorithm for Low Memory Wavelet Image Compression
As wavelet-based image coding is set to become more widely used (e.g. with the completion of the JPEG2000 standard), memory efficiency for wavelet-based coding is becoming an incr...
Christos Chrysafis, Antonio Ortega
DCC
2003
IEEE
16 years 4 months ago
Compression of RADARSAT Data with Block Adaptive Wavelets
: This paper proposes a new algorithm referred to as the Wavelet Packet-based Embedded Block coding (WPEB) scheme for SAR data compression. This algorithm combines the following pr...
Ian G. Cumming, Jing Wang