Sciweavers

1401 search results - page 274 / 281
» Cost-Sensitive Test Strategies
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 7 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
JSAC
2008
165views more  JSAC 2008»
13 years 7 months ago
Energy-Efficient Routing Schemes for Underwater Acoustic Networks
Interest in underwater acoustic networks has grown rapidly with the desire to monitor the large portion of the world covered by oceans. Fundamental differences between underwater a...
Michele Zorzi, Paolo Casari, Nicola Baldo, Albert ...
JMM2
2006
167views more  JMM2 2006»
13 years 7 months ago
Computer Vision Methods for Improved Mobile Robot State Estimation in Challenging Terrains
External perception based on vision plays a critical role in developing improved and robust localization algorithms, as well as gaining important information about the vehicle and ...
Annalisa Milella, Giulio Reina, Roland Siegwart
MAGS
2008
104views more  MAGS 2008»
13 years 7 months ago
Retractable contract network for empowerment in workforce scheduling
This paper is about business modelling and negotiation protocol design in distributed scheduling, where individual agents have individual (potentially conflicting) interests. It i...
Edward P. K. Tsang, Timothy Gosling, Botond Virgin...
ENGL
2007
100views more  ENGL 2007»
13 years 7 months ago
Utilizing Computational Intelligence to Assist in Software Release Decision
—Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discov...
Tong-Seng Quah, Mie Mie Thet Thwin