Architectures that exploit control independence (CI) promise to remove in-order fetch bottlenecks, like branch mispredicts, instruction-cache misses and fetch unit stalls, from th...
Most quantizer based data hiding schemes use uniform quantizer, which is not optimal if the host signal is not uniformly distributed. In this paper, we design a quantizer that is ...
In this paper we propose a novel data hiding procedure called Quantized Projection (QP), that combines elements from quantization (i.e. Quantization Index Modulation, QIM) and spr...
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...
Many applications of social networks require relationship anonymity due to the sensitive, stigmatizing, or confidential nature of relationship. Recent work showed that the simple ...