Sciweavers

780 search results - page 63 / 156
» A New Identification Scheme Based on the Perceptrons Problem
Sort
View
ICMCS
2008
IEEE
173views Multimedia» more  ICMCS 2008»
14 years 2 months ago
Improvement of the embedding efficiency of LSB matching by sum and difference covering set
As an important attribute directly influencing the steganographic scheme, the embedding efficiency is defined as the average number of random data bits per one embedding change...
Xiaolong Li, Tieyong Zeng, Bin Yang
ICIP
2004
IEEE
14 years 9 months ago
Theoretical analysis of some regularized image denoising methods
Regularization techniques have been in use in signal recovery for over four decades. In this paper, we propose a new, synthetic approach to the study of regularization methods in ...
Patrick L. Combettes, Valerie R. Wajs
TELETRAFFIC
2007
Springer
14 years 1 months ago
Network Capacity Allocation in Service Overlay Networks
We study the capacity allocation problem in service overlay networks (SON)s with state-dependent connection routing based on revenue maximization. We formulate the dimensioning pro...
Ngok Lam, Zbigniew Dziong, Lorne Mason
ASIACRYPT
2001
Springer
14 years 7 days ago
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Abstract. Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is o...
Pierre-Alain Fouque, David Pointcheval
CVPR
2009
IEEE
15 years 2 months ago
Reducing JointBoost-Based Multiclass Classification to Proximity Search
Boosted one-versus-all (OVA) classifiers are commonly used in multiclass problems, such as generic object recognition, biometrics-based identification, or gesture recognition. Join...
Alexandra Stefan (University of Texas at Arlington...