Sciweavers

174 search results - page 16 / 35
» Practically Perfect
Sort
View
TIFS
2008
152views more  TIFS 2008»
14 years 9 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
TSP
2008
91views more  TSP 2008»
14 years 9 months ago
Nonlinear and Nonideal Sampling: Theory and Methods
We study a sampling setup where a continuous-time signal is mapped by a memoryless, invertible and nonlinear transformation, and then sampled in a nonideal manner. Such scenarios a...
Tsvi G. Dvorkind, Yonina C. Eldar, Ewa Matusiak
VLDB
2001
ACM
151views Database» more  VLDB 2001»
15 years 9 months ago
Approximate query mapping: Accounting for translation closeness
Abstract In this paper we present a mechanism for approximately translating Boolean query constraints across heterogeneous information sources. Achieving the best translation is ch...
Kevin Chen-Chuan Chang, Hector Garcia-Molina
INFOCOM
2007
IEEE
15 years 3 months ago
Multiple-Choice Random Network for Server Load Balancing
Abstract—In many networking applications such as file sharing, structured peer-to-peer networks are increasingly used in dynamic situations with fluctuating load, which require...
Ye Xia, Alin Dobra, Seung Chul Han
100
Voted
SRDS
1993
IEEE
15 years 1 months ago
Bayesian Analysis for Fault Location in Homogeneous Distributed Systems
We propose a simple and practical probabilistic comparison-based model, employing multiple incomplete test concepts, for handling fault location in distributed systems using a Bay...
Yu Lo Cyrus Chang, Leslie C. Lander, Horng-Shing L...