Sciweavers

180 search results - page 33 / 36
» An Information-Theoretic Model for Steganography
Sort
View
IMC
2005
ACM
14 years 28 days ago
An Information-theoretic Approach to Network Monitoring and Measurement
Network engineers and operators are faced with a number of challenges that arise in the context of network monitoring and measurement. These include: i) how much information is in...
Yong Liu, Donald F. Towsley, Tao Ye, Jean-Chrysost...
EUROCRYPT
1999
Springer
13 years 11 months ago
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions
We consider the problem of basing Oblivious Transfer (OT) and Bit Commitment (BC), with information theoretic security, on seemingly weaker primitives. We introduce a general model...
Ivan Damgård, Joe Kilian, Louis Salvail
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
13 years 8 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...
JMLR
2011
192views more  JMLR 2011»
13 years 2 months ago
Minimum Description Length Penalization for Group and Multi-Task Sparse Learning
We propose a framework MIC (Multiple Inclusion Criterion) for learning sparse models based on the information theoretic Minimum Description Length (MDL) principle. MIC provides an...
Paramveer S. Dhillon, Dean P. Foster, Lyle H. Unga...
ICIP
2005
IEEE
14 years 9 months ago
Active contours on statistical manifolds and texture segmentation
A new approach to active contours on statistical manifolds is presented. The statistical manifolds are 2dimensional Riemannian manifolds that are statistically defined by maps that...
Sang-Mook Lee, A. Lynn Abbott, Neil A. Clark, Phil...