Sciweavers

2747 search results - page 539 / 550
» Non-oblivious Strategy Improvement
Sort
View
CORR
2006
Springer
143views Education» more  CORR 2006»
14 years 10 months ago
Efficient Route Tracing from a Single Source
Traceroute is a networking tool that allows one to discover the path that packets take from a source machine, through the network, to a destination machine. It is widely used as a...
Benoit Donnet, Philippe Raoult, Timur Friedman
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 10 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
81
Voted
JCSS
2008
81views more  JCSS 2008»
14 years 10 months ago
A simulator for adaptive parallel applications
Dynamically allocating computing nodes to parallel applications is a promising technique for improving the utilization of cluster resources. Detailed simulations can help identify...
Basile Schaeli, Sebastian Gerlach, Roger D. Hersch
IVC
2006
120views more  IVC 2006»
14 years 10 months ago
Face recognition by fusing thermal infrared and visible imagery
Thermal infrared (IR) imagery offers a promising alternative to visible imagery for face recognition due to its relative insensitive to variations in face appearance caused by ill...
George Bebis, Aglika Gyaourova, Saurabh Singh, Ioa...
JNW
2008
71views more  JNW 2008»
14 years 10 months ago
Enhancement of Delivery of Warning Messages for Mobile Networks
Vehicle-to-vehicle (V2V) communication systems have been studied extensively in recent years by transportation experts worldwide. Such systems enable the transmission of warning me...
Chia-Sheng Tsai, Wun-Kai Du