Sciweavers

1244 search results - page 219 / 249
» Searching in Higher Dimension
Sort
View
95
Voted
TIP
2002
102views more  TIP 2002»
15 years 1 months ago
Hierarchical watermarking for secure image authentication with localization
Several fragile watermarking schemes presented in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to impr...
Mehmet Utku Celik, Gaurav Sharma, Eli Saber, A. Mu...
104
Voted
ICS
2010
Tsinghua U.
15 years 12 days ago
An approach to resource-aware co-scheduling for CMPs
We develop real-time scheduling techniques for improving performance and energy for multiprogrammed workloads that scale nonuniformly with increasing thread counts. Multithreaded ...
Major Bhadauria, Sally A. McKee
111
Voted
JASIS
2010
170views more  JASIS 2010»
15 years 10 days ago
Analyzing URL queries
This study investigated a relatively unexamined query type, queries composed of URLs. The extent, variation and user click-through behavior was examined to determine the intent be...
Wei Meng Lee, Mark Sanderson
106
Voted
VTC
2010
IEEE
163views Communications» more  VTC 2010»
15 years 7 days ago
Channel Allocation in a Multiple Distributed Vehicular Users Using Game Theory
— In this paper, we look into the channel allocation problem for a non-cooperative cognitive vehicular ad-hoc communication network with multiple communicating pairs distributed ...
Yusita Kasdani, Yong Huat Chew, Chau Yuen, Woon Ha...
CORR
2011
Springer
174views Education» more  CORR 2011»
14 years 9 months ago
Hide-and-Seek with Directional Sensing
: We consider a game played between a hider, who hides a static object in one of several possible positions in a bounded planar region, and a searcher who wishes to reach the objec...
Alessandro Borri, Shaunak Dattaprasad Bopardikar, ...