Sciweavers

1632 search results - page 159 / 327
» Topological Analysis of Refinement
Sort
View
88
Voted
SSWMC
2004
15 years 15 days ago
On estimation of secret message length in LSB steganography in spatial domain
In this paper, we present a new method for estimating the secret message length of bit-streams embedded using the Least Significant Bit embedding (LSB) at random pixel positions. ...
Jessica J. Fridrich, Miroslav Goljan
92
Voted
WSC
1998
15 years 14 days ago
Developing a Simulation Strategy for British Airways OR
Many organisations have seen the use of simulation evolve, often in something of a piecemeal fashion. This may lead to some deficiencies in the way that simulation is employed. Th...
Stewart Robinson, Mark D. Stanger
UAI
2007
15 years 9 days ago
User-Centered Methods for Rapid Creation and Validation of Bayesian Belief Networks
Bayesian networks (BN) are particularly well suited to capturing vague and uncertain knowledge. However, the capture of this knowledge and associated reasoning from human domain e...
Jonathan D. Pfautz, Zach Cox, Geoffrey Catto, Davi...
ADCM
2008
187views more  ADCM 2008»
14 years 11 months ago
Approximation on the sphere using radial basis functions plus polynomials
In this paper we analyse a hybrid approximation of functions on the sphere S2 R3 by radial basis functions combined with polynomials, with the radial basis functions assumed to be...
Ian H. Sloan, Alvise Sommariva
ENTCS
2008
88views more  ENTCS 2008»
14 years 11 months ago
Formal Modelling of Salience and Cognitive Load
Well-designed interfaces use procedural and sensory cues to increase the salience of appropriate actions and intentions. However, empirical studies suggest that cognitive load can...
Rimvydas Ruksenas, Jonathan Back, Paul Curzon, Ann...