Sciweavers

2845 search results - page 397 / 569
» Constraints over Ontologies
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 9 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
JOT
2006
80views more  JOT 2006»
13 years 9 months ago
Remote Job Submission Security
This paper presents the middleware needed to deploy jobs to non-geographically colocated clusters with decentralized look-up severs. We have named our framework the Initium Remote...
Pawel Krepsztul, Douglas A. Lyon
TMC
2008
127views more  TMC 2008»
13 years 9 months ago
Time and Energy Complexity of Distributed Computation of a Class of Functions in Wireless Sensor Networks
We consider a scenario in which a wireless sensor network is formed by randomly deploying n sensors to measure some spatial function over a field, with the objective of computing a...
Nilesh Khude, Anurag Kumar, Aditya Karnik
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 8 months ago
An Optimal Dynamic Mechanism for Multi-Armed Bandit Processes
We consider the problem of revenue-optimal dynamic mechanism design in settings where agents' types evolve over time as a function of their (both public and private) experien...
Sham M. Kakade, Ilan Lobel, Hamid Nazerzadeh
ICCV
2007
IEEE
15 years 4 months ago
 A Component Based Deformable Model for Generalized Face Alignment
This paper presents a component based deformable model for generalized face alignment, in which a novel bistage statistical framework is proposed to account for both local and g...
Yuchi Huang, Qingshan Liu, Dimitris Metaxas