Sciweavers

1687 search results - page 64 / 338
» Which pointer analysis should I use
Sort
View
DSD
2008
IEEE
166views Hardware» more  DSD 2008»
15 years 10 months ago
Pearson - based Analysis of Positioning Error Distribution in Wireless Sensor Networks
Abstract—In two recent contributions [1], [2], we have provided a comparative analysis of various optimization algorithms, which can be used for atomic location estimation, and s...
Stefano Tennina, Marco Di Renzo, Fabio Graziosi, F...
120
Voted
DOCENG
2003
ACM
15 years 9 months ago
Management of trusted citations
We discuss how references and citations within a document to particular sources can be verified and guaranteed. When a document refers through a quotation to another document, th...
Christer Fernström
130
Voted
MMSEC
2006
ACM
148views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Minimizing the embedding impact in steganography
In this paper, we study the trade-off in steganography between the number of embedding changes and their amplitude. We assume that each element of the cover image is assigned a sc...
Jessica J. Fridrich
CORR
2007
Springer
67views Education» more  CORR 2007»
15 years 3 months ago
Interroger un corpus par le sens
In textual knowledge management, statistical methods prevail. Nonetheless, some difficulties cannot be overcome by these methodologies. I propose a symbolic approach using a comp...
Bernard Jacquemin
125
Voted
PADS
2004
ACM
15 years 9 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...