Sciweavers

4066 search results - page 93 / 814
» Almost Complete Sets
Sort
View
ICIP
2007
IEEE
16 years 4 months ago
On a Watermarking Scheme in the Logarithmic Domain and its Perceptual Advantages
Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they can completely ruin the performance of the waterm...
Pedro Comesaña, Fernando Pérez-Gonz&...
124
Voted
ACHI
2008
IEEE
15 years 9 months ago
Adaptive Self-Assessment Trying to Reduce Fear
— Almost everyone has experienced fear at least once in their life because of a test. Fear can positively mobilise students, when it is under control. However, when fear becomes ...
Anastasios A. Economides, Christos N. Moridis
CIE
2007
Springer
15 years 9 months ago
Circuit Complexity of Regular Languages
We survey our current knowledge of circuit complexity of regular languages and we prove that regular languages that are in AC0 and ACC0 are all computable by almost linear size ci...
Michal Koucký
IWDW
2007
Springer
15 years 9 months ago
Dither Modulation in the Logarithmic Domain
Abstract. Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ru...
Pedro Comesaña, Fernando Pérez-Gonz&...
GECCO
2004
Springer
15 years 8 months ago
Schema Disruption in Chromosomes That Are Structured as Binary Trees
We are interested in schema disruption behavior when chromosomes are structured as binary trees. We give the definition of the disruption probability dp(H) of a schema H, and also...
William A. Greene