Sciweavers

4184 search results - page 653 / 837
» Names of Our Lives
Sort
View
TIFS
2008
133views more  TIFS 2008»
15 years 1 months ago
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
Abstract-- It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensu...
François Cayre, Patrick Bas
TIFS
2008
179views more  TIFS 2008»
15 years 1 months ago
Blind Identification of Source Cell-Phone Model
The various image-processing stages in a digital camera pipeline leave telltale footprints, which can be exploited as forensic signatures. These footprints consist of pixel defects...
Oya Çeliktutan, Bülent Sankur, Ismail ...
TKDE
2008
111views more  TKDE 2008»
15 years 1 months ago
Text Clustering with Feature Selection by Using Statistical Data
Abstract-- Feature selection is an important method for improving the efficiency and accuracy of text categorization algorithms by removing redundant and irrelevant terms from the ...
Yanjun Li, Congnan Luo, Soon M. Chung
CCR
2005
96views more  CCR 2005»
15 years 1 months ago
Stability of end-to-end algorithms for joint routing and rate control
Dynamic multi-path routing has the potential to improve the reliability and performance of a communication network, but carries a risk. Routing needs to respond quickly to achieve...
Frank P. Kelly, Thomas Voice
TSI
2008
129views more  TSI 2008»
15 years 1 months ago
COSMOS, composition de noeuds de contexte
Ubiquitous applications are facing a large diversity of execution contexts. However, this diversity requires some continual adaptation to preserve the correct execution of these ap...
Denis Conan, Romain Rouvoy, Lionel Seinturier