Sciweavers

3224 search results - page 515 / 645
» Review of Affective Computing
Sort
View
IJOE
2008
98views more  IJOE 2008»
15 years 3 months ago
OpenLabs Security Laboratory - The Online Security Experiment Platform
For experiments to be reproducible, it is important to have a known and controlled environment. This requires isolation from the surroundings. For security experiments, e.g. with h...
Johan Zackrisson, Charlie Svahnberg
COGSCI
2007
99views more  COGSCI 2007»
15 years 3 months ago
Language Evolution by Iterated Learning With Bayesian Agents
Languages are transmitted from person to person and generation to generation via a process of iterated learning: people learn a language from other people who once learned that la...
Thomas L. Griffiths, Michael L. Kalish
INFSOF
2006
73views more  INFSOF 2006»
15 years 3 months ago
Theory and algorithms for slicing unstructured programs
Program slicing identifies parts of a program that potentially affect a chosen computation. It has many applications in software engineering, including maintenance, evolution and ...
Mark Harman, Arun Lakhotia, David Binkley
111
Voted
JEI
2006
128views more  JEI 2006»
15 years 3 months ago
Performance study of common image steganography and steganalysis techniques
Abstract. We investigate the performance of state of the art universal steganalyzers proposed in the literature. These universal steganalyzers are tested against a number of well-k...
Mehdi Kharrazi, Husrev T. Sencar, Nasir D. Memon
122
Voted
JSAC
2006
89views more  JSAC 2006»
15 years 3 months ago
Robust multiuser detection for multicarrier CDMA systems
Abstract--Multiuser detection (MUD) for code-division multiple-access (CDMA) systems usually relies on some a priori channel estimates, which are obtained either blindly or by usin...
Rensheng Wang, Hongbin Li, Tao Li