Sciweavers

180 search results - page 34 / 36
» An Information-Theoretic Model for Steganography
Sort
View
ASIAN
2004
Springer
180views Algorithms» more  ASIAN 2004»
14 years 23 days ago
Counting by Coin Tossings
Abstract. This text is an informal review of several randomized algorithms that have appeared over the past two decades and have proved instrumental in extracting efficiently quant...
Philippe Flajolet
EUROCRYPT
2004
Springer
14 years 23 days ago
Immunizing Encryption Schemes from Decryption Errors
We provide methods for transforming an encryption scheme susceptible to decryption errors into one that is immune to these errors. Immunity to decryption errors is vital when const...
Cynthia Dwork, Moni Naor, Omer Reingold
BIRTHDAY
2010
Springer
14 years 5 days ago
The Arrow of Time through the Lens of Computing
Egon Börger Ambient Abstract State Machines with Applications 11:00 AM Manfred Broy Realizability of System Interface Specifications 11:30 AM Ofer Strichman Proving Equivalence be...
Krishna V. Palem
JCIT
2007
159views more  JCIT 2007»
13 years 7 months ago
Agent-Based Simulation to Seek For Effective Communication In Project Management
Many project managers of a large scale project shortened delivery period of his or her projects unwillingly by the request of clients. However, some of them believe there is no dif...
Masao Watabe, Takao Terano
IJCV
2010
169views more  IJCV 2010»
13 years 5 months ago
Rigid Structure from Motion from a Blind Source Separation Perspective
We present an information theoretic approach to define the problem of structure from motion (SfM) as a blind source separation one. Given that for almost all practical joint densi...
Jeff Fortuna, Aleix M. Martínez