Sciweavers

5473 search results - page 1026 / 1095
» On the graph isomorphism problem
Sort
View
84
Voted
EMNLP
2010
14 years 10 months ago
Practical Linguistic Steganography Using Contextual Synonym Substitution and Vertex Colour Coding
Linguistic Steganography is concerned with hiding information in natural language text. One of the major transformations used in Linguistic Steganography is synonym substitution. ...
Ching-Yun Chang, Stephen Clark
98
Voted
FORMATS
2010
Springer
14 years 10 months ago
Expected Reachability-Time Games
In an expected reachability-time game (ERTG) two players, Min and Max, move a token along the transitions of a probabilistic timed automaton, so as to minimise and maximise, respec...
Vojtech Forejt, Marta Z. Kwiatkowska, Gethin Norma...
104
Voted
ICIP
2010
IEEE
14 years 10 months ago
Video retargeting: A visual-friendly dynamic programming approach
Video retargeting is the task of fitting standard-sized video into arbitrary screen. A compelling retargeting attempts to preserve most visual information of original video as wel...
Zheng Yuan, Taoran Lu, Yu Huang, Dapeng Wu, Heathe...
OTM
2010
Springer
14 years 10 months ago
Supporting Complex Changes in Evolving Interrelated Web Databanks
In this paper we deal with problems occurring in evolving interrelated Web databanks. Examples of such databanks are networks of interlinked scientific repositories on the Web, man...
Yannis Stavrakas, George Papastefanatos
107
Voted
SOCIALCOM
2010
14 years 10 months ago
A Scalable Framework for Modeling Competitive Diffusion in Social Networks
Multiple phenomena often diffuse through a social network, sometimes in competition with one another. Product adoption and political elections are two examples where network diffus...
Matthias Broecheler, Paulo Shakarian, V. S. Subrah...
« Prev « First page 1026 / 1095 Last » Next »