Sciweavers

409 search results - page 62 / 82
» Review spam detection
Sort
View
ESORICS
2004
Springer
15 years 5 months ago
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
Abstract. The recent approach of a model-based framework for steganography fruitfully contributes to the discussion on the security of steganography. In addition, the first propos...
Rainer Böhme, Andreas Westfeld
PPSN
2004
Springer
15 years 5 months ago
LS-CMA-ES: A Second-Order Algorithm for Covariance Matrix Adaptation
Abstract. Evolution Strategies, Evolutionary Algorithms based on Gaussian mutation and deterministic selection, are today considered the best choice as far as parameter optimizatio...
Anne Auger, Marc Schoenauer, Nicolas Vanhaecke
WISA
2004
Springer
15 years 5 months ago
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking
This paper addresses the problem of content-based synchronization for robust watermarking. Synchronization is a process of extracting the location to embed and detect the signature...
Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, Young-...
CLUSTER
2004
IEEE
15 years 3 months ago
Towards informatic analysis of Syslogs
The complexity and cost of isolating the root cause of system problems in large parallel computers generally scales with the size of the system. Syslog messages provide a primary ...
John Stearley
DAGSTUHL
2006
15 years 1 months ago
Similarity in Programs
Abstract. An overview of the concept of program similarity is presented. It divides similarity into two types--syntactic and semantic-and provides a review of eight categories of m...
Andrew Walenstein, Mohammad El-Ramly, James R. Cor...