Sciweavers

236 search results - page 18 / 48
» From Weak to Strong Watermarking
Sort
View
ICPADS
2002
IEEE
14 years 2 months ago
A Mobile Cache Consistency Protocol Using Shareable Read/Write Time Locks
Object caching is often used to improve the performance of mobile applications, but the gain is often lessened by the additional load of maintaining consistency between an origina...
Abhinav Vora, Zahir Tari, Peter Bertók, Kwo...
CORR
2011
Springer
127views Education» more  CORR 2011»
13 years 1 months ago
Generalized Boosting Algorithms for Convex Optimization
Boosting is a popular way to derive powerful learners from simpler hypothesis classes. Following previous work (Mason et al., 1999; Friedman, 2000) on general boosting frameworks,...
Alexander Grubb, J. Andrew Bagnell
TSMC
2008
172views more  TSMC 2008»
13 years 9 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
EMSOFT
2008
Springer
13 years 11 months ago
Disassembling real-time fault-tolerant programs
We focus on decomposition of hard-masking real-time faulttolerant programs (where safety, timing constraints, and liveness are preserved in the presence of faults) that are design...
Borzoo Bonakdarpour, Sandeep S. Kulkarni, Anish Ar...
COMBINATORICS
1999
82views more  COMBINATORICS 1999»
13 years 9 months ago
On Highly Closed Cellular Algebras and Highly Closed Isomorphisms
We define and study m-closed cellular algebras (coherent configurations) and m-isomorphisms of cellular algebras which can be regarded as mth approximations of Schurian algebras (...
Sergei Evdokimov, Ilia N. Ponomarenko