Sciweavers

1814 search results - page 274 / 363
» Watermarking relational data: framework, algorithms and anal...
Sort
View
JAR
2000
145views more  JAR 2000»
14 years 11 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
ICIAP
2009
ACM
15 years 3 months ago
Applying Visual Object Categorization and Memory Colors for Automatic Color Constancy
This paper presents a framework for using high-level visual information to enhance the performance of automatic color constancy algorithms. The approach is based on recognizing spe...
Esa Rahtu, Jarno Nikkanen, Juho Kannala, Leena Lep...
PADS
1996
ACM
15 years 3 months ago
Experiments in Automated Load Balancing
One of the promises of parallelized discrete-event simulation is that it might provide significant speedups over sequential simulation. In reality, high performance cannot be achi...
Linda F. Wilson, David M. Nicol
AAAI
2008
15 years 1 months ago
Economic Hierarchical Q-Learning
Hierarchical state decompositions address the curse-ofdimensionality in Q-learning methods for reinforcement learning (RL) but can suffer from suboptimality. In addressing this, w...
Erik G. Schultink, Ruggiero Cavallo, David C. Park...
SIGGRAPH
1999
ACM
15 years 3 months ago
Creating Generative Models from Range Images
We describe a new approach for creating concise high-level generative models from range images or other approximate representations of real objects. Using data from a variety of a...
Ravi Ramamoorthi, James Arvo