Sciweavers

2449 search results - page 273 / 490
» Tensor Embedding Methods
Sort
View
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
15 years 4 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
CASES
2005
ACM
15 years 29 days ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
ICDE
2012
IEEE
240views Database» more  ICDE 2012»
13 years 1 months ago
Approximate Shortest Distance Computing: A Query-Dependent Local Landmark Scheme
—Shortest distance query between two nodes is a fundamental operation in large-scale networks. Most existing methods in the literature take a landmark embedding approach, which s...
Miao Qiao, Hong Cheng, Lijun Chang, Jeffrey Xu Yu
ICIP
2006
IEEE
15 years 5 months ago
Lossless Compression of Microarray Images
During the past years, the development of microarray technology has been remarkable, and it is becoming a daily tool in many genomic research laboratories. The widespread adoption...
António J. R. Neves, Armando J. Pinho
ICCD
2007
IEEE
105views Hardware» more  ICCD 2007»
15 years 2 months ago
Power-aware mapping for reconfigurable NoC architectures
A core mapping method for reconfigurable network-on-chip (NoC) architectures is presented in this paper. In most of the existing methods, mapping is carried out based on the traff...
Mehdi Modarressi, Hamid Sarbazi-Azad