Sciweavers

8808 search results - page 1497 / 1762
» Process Change Patterns
Sort
View
GECCO
2005
Springer
130views Optimization» more  GECCO 2005»
15 years 4 months ago
ATNoSFERES revisited
ATNoSFERES is a Pittsburgh style Learning Classifier System (LCS) in which the rules are represented as edges of an Augmented Transition Network. Genotypes are strings of tokens ...
Samuel Landau, Olivier Sigaud, Marc Schoenauer
85
Voted
IH
2005
Springer
15 years 4 months ago
Data Hiding in Compiled Program Binaries for Enhancing Computer System Performance
Abstract. Information hiding has been studied in many security applications such as authentication, copyright management and digital forensics. In this work, we introduce a new app...
Ashwin Swaminathan, Yinian Mao, Min Wu, Krishnan K...
90
Voted
IPSN
2005
Springer
15 years 4 months ago
Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis
A wireless sensor network consists of a large number of small, resource-constrained devices and usually operates in hostile environments that are prone to link and node failures. ...
Jen-Yeu Chen, Gopal Pandurangan, Dongyan Xu
ISMIR
2005
Springer
182views Music» more  ISMIR 2005»
15 years 4 months ago
The Mel-Frequency Cepstral Coefficients in the Context of Singer Identification
The singing voice is the oldest and most complex musical instrument. A familiar singer’s voice is easily recognizable for humans, even when hearing a song for the first time. O...
Annamaria Mesaros, Jaakko Astola
IWDW
2005
Springer
15 years 4 months ago
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images
Abstract. In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coefficient quantization schemes...
Patrick Bas, Jarmo Hurri
« Prev « First page 1497 / 1762 Last » Next »