Sciweavers

1516 search results - page 162 / 304
» The Increasing Nvalue Constraint
Sort
View
SSWMC
2004
15 years 5 months ago
Steganalysis of block-structured stegotext
We study a detection-theoretic approach to steganalysis. The relative entropy between covertext and stegotext determines the steganalyzer's difficulty in discriminating them,...
Ying Wang, Pierre Moulin
CORR
2008
Springer
100views Education» more  CORR 2008»
15 years 3 months ago
Spatial Interference Cancelation for Mobile Ad Hoc Networks: Perfect CSI
Abstract--Interference between nodes directly limits the capacity of mobile ad hoc networks. This paper focuses on spatial interference cancelation with perfect channel state infor...
Kaibin Huang, Jeffrey G. Andrews, Robert W. Heath ...
GRID
2006
Springer
15 years 3 months ago
Metascheduling Multiple Resource Types using the MMKP
Grid computing involves the transparent sharing of computational resources of many types by users across large geographic distances. The altruistic nature of many current grid reso...
Daniel C. Vanderster, Nikitas J. Dimopoulos, Randa...
TASLP
2008
129views more  TASLP 2008»
15 years 3 months ago
Chroma Binary Similarity and Local Alignment Applied to Cover Song Identification
Abstract--We present a new technique for audio signal comparison based on tonal subsequence alignment and its application to detect cover versions (i.e., different performances of ...
Joan Serrà, Emilia Gómez, Perfecto H...
TII
2008
88views more  TII 2008»
15 years 3 months ago
Performing Flexible Control on Low-Cost Microcontrollers Using a Minimal Real-Time Kernel
In recent years, approaches to control performance and resource optimization for embedded control systems have been receiving increased attention. Most of them focus on theory, whe...
Ricardo Marau, Pedro Leite, Manel Velasco, Pau Mar...