Sciweavers

655 search results - page 106 / 131
» Testing Properties of Collections of Distributions
Sort
View
72
Voted
SSWMC
2004
14 years 11 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
CORR
2007
Springer
131views Education» more  CORR 2007»
14 years 9 months ago
Bayesian sequential change diagnosis
Sequential change diagnosis is the joint problem of detection and identification of a sudden and unobservable change in the distribution of a random sequence. In this problem, the...
Savas Dayanik, Christian Goulding, H. Vincent Poor
77
Voted
ALIFE
2000
14 years 9 months ago
Pattern Formation and Optimization in Army Ant Raids
Army ant colonies display complex foraging raid patterns involving thousands of individuals communicating through chemical trails. In this article we explore, by means of a simple ...
Ricard V. Solé, Eric Bonabeau, Jordi Delgad...
NN
2002
Springer
123views Neural Networks» more  NN 2002»
14 years 9 months ago
Neuromodulation and plasticity in an autonomous robot
In this paper we implement a computational model of a neuromodulatory system in an autonomous robot. The output of the neuromodulatory system acts as a value signal, modulating wi...
Olaf Sporns, William H. Alexander
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
14 years 7 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer