Sciweavers

251 search results - page 36 / 51
» Using self-dissimilarity to quantify complexity
Sort
View
SSWMC
2004
15 years 1 months ago
Searching for the stego-key
Steganalysis in the wide sense consists of first identifying suspicious objects and then further analysis during which we try to identify the steganographic scheme used for embedd...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
AAAI
1998
15 years 1 months ago
Supermodels and Robustness
When search techniques are used to solve a practical problem, the solution produced is often brittle in the sense that small execution difficulties can have an arbitrarily large e...
Matthew L. Ginsberg, Andrew J. Parkes, Amitabha Ro...
VIP
2003
15 years 1 months ago
On the Structural Algorithm of Filtering Graphs for Layout
When the amount of information in visualization becomes large enough, users can not perceive all elements at the same time. This problem can be solved by removing parts of the inf...
Xiaodi Huang, Wei Lai
WSC
1998
15 years 1 months ago
Application of Business Process Modeling at Timberland
Process modeling and simulation was introduced to the Timberland Co. in order to help improve the company's increasingly complex and cross-functional business processes. Two ...
Dan Grosz
CORR
2008
Springer
125views Education» more  CORR 2008»
14 years 11 months ago
Power Control in Cognitive Radio Networks: How to Cross a Multi-Lane Highway
Abstract--We consider power control in cognitive radio networks where secondary users identify and exploit instantaneous and local spectrum opportunities without causing unacceptab...
Wei Ren, Qing Zhao, Ananthram Swami