Sciweavers

667 search results - page 27 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
ESORICS
2004
Springer
15 years 5 months ago
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
Abstract. The recent approach of a model-based framework for steganography fruitfully contributes to the discussion on the security of steganography. In addition, the first propos...
Rainer Böhme, Andreas Westfeld
CLUSTER
2003
IEEE
15 years 5 months ago
Compiler Optimized Remote Method Invocation
We further increase the efficiency of Java RMI programs. Where other optimizing re-implementations of RMI use pre-processors to create stubs and skeletons and to create class spe...
Ronald Veldema, Michael Philippsen
GECCO
2006
Springer
208views Optimization» more  GECCO 2006»
15 years 3 months ago
Comparing evolutionary and temporal difference methods in a reinforcement learning domain
Both genetic algorithms (GAs) and temporal difference (TD) methods have proven effective at solving reinforcement learning (RL) problems. However, since few rigorous empirical com...
Matthew E. Taylor, Shimon Whiteson, Peter Stone
DATE
2008
IEEE
82views Hardware» more  DATE 2008»
15 years 6 months ago
Periodic Steady-State Analysis Augmented with Design Equality Constraints
— A design-oriented periodic steady-state analysis is presented in this paper. The new analysis finds the values of circuit parameters that result in a desired circuit performan...
Igor Vytyaz, Pavan Kumar Hanumolu, Un-Ku Moon, Kar...
BMCBI
2010
94views more  BMCBI 2010»
14 years 12 months ago
Comparison study of microarray meta-analysis methods
Background: Meta-analysis methods exist for combining multiple microarray datasets. However, there are a wide range of issues associated with microarray meta-analysis and a limite...
Anna Campain, Yee Hwa Yang