Sciweavers

5056 search results - page 374 / 1012
» Network Coding Theory
Sort
View
GECCO
2005
Springer
232views Optimization» more  GECCO 2005»
15 years 10 months ago
Factorial representations to generate arbitrary search distributions
A powerful approach to search is to try to learn a distribution of good solutions (in particular of the dependencies between their variables) and use this distribution as a basis ...
Marc Toussaint
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
15 years 9 months ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
ECIS
2001
15 years 5 months ago
Knowledge integration processes within the context of enterprise resources planning (ERP) systems implementation
The empirical findings from an organization, which adopted and implemented ERP, are presented. The focus of this empirical research was to understand the nature and processes of k...
Jimmy C. Huang, Sue Newell, Shan Ling Pan, Robert ...
ICMCS
2010
IEEE
150views Multimedia» more  ICMCS 2010»
15 years 4 months ago
H.264 stream replacement watermarking with CABAC encoding
This paper describes a watermarking method to directly embed information into a CABAC entropy coded H.264/AVC stream. In theory, modification of a part of an arithmetically coded ...
Dekun Zou, Jeffrey A. Bloom
CORR
2008
Springer
143views Education» more  CORR 2008»
15 years 4 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani