Sciweavers

1060 search results - page 106 / 212
» Notes on Coding Theory
Sort
View
COLING
2010
14 years 4 months ago
Visually and Phonologically Similar Characters in Incorrect Simplified Chinese Words
Visually and phonologically similar characters are major contributing factors for errors in Chinese text. By defining appropriate similarity measures that consider extended Cangji...
Chao-Lin Liu, Min-Hua Lai, Yi-Hsuan Chuang, Chia-Y...
ECCC
2011
234views ECommerce» more  ECCC 2011»
14 years 4 months ago
On the complexity of computational problems regarding distributions (a survey)
We consider two basic computational problems regarding discrete probability distributions: (1) approximating the statistical difference (aka variation distance) between two given d...
Oded Goldreich, Salil P. Vadhan
CRYPTO
2012
Springer
219views Cryptology» more  CRYPTO 2012»
13 years 10 days ago
Tamper and Leakage Resilience in the Split-State Model
It is notoriously difficult to create hardware that is immune from side channel and tampering attacks. A lot of recent literature, therefore, has instead considered algorithmic de...
Feng-Hao Liu, Anna Lysyanskaya
ICSE
2008
IEEE-ACM
15 years 10 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....
MMSEC
2006
ACM
148views Multimedia» more  MMSEC 2006»
15 years 3 months ago
Minimizing the embedding impact in steganography
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Jessica J. Fridrich