Sciweavers

244 search results - page 21 / 49
» A study on the design issues of Memetic Algorithm
Sort
View
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
14 years 2 months ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser
DATE
2007
IEEE
141views Hardware» more  DATE 2007»
14 years 2 months ago
Energy-efficient real-time task scheduling with task rejection
In the past decade, energy-efficiency has been an important system design issue in both hardware and software managements. For mobile applications with critical missions, both ene...
Jian-Jia Chen, Tei-Wei Kuo, Chia-Lin Yang, Ku-Jei ...
ECCV
2010
Springer
14 years 2 months ago
What does classifying more than 10,000 image categories tell us?
Image classification is a critical task for both humans and computers. One of the challenges lies in the large scale of the semantic space. In particular, humans can recognize tens...
ICPR
2000
IEEE
14 years 12 months ago
Content-Based Watermarking Model
In this paper, we propose a new general additive watermarking model based on the content of digital images, called as CBWM (Content-Based Watermarking Model). It provides a common...
Ruizhen Liu, Tieniu Tan
ASIAN
2006
Springer
98views Algorithms» more  ASIAN 2006»
14 years 2 months ago
Information Hiding in the Join Calculus
Abstract. We aim to provide information hiding support in concurrent object-oriented programming languages. We study the issue both at the object level and class level, in the cont...
Qin Ma 0002, Luc Maranget