Sciweavers

43 search results - page 6 / 9
» On the complexity and hardness of the steganography embeddin...
Sort
View
ASPDAC
2000
ACM
95views Hardware» more  ASPDAC 2000»
13 years 12 months ago
Fair watermarking techniques
Many intellectual property protection (IPP) techniques have been proposed. Their primary objectives are providing convincible proof of authorship with least degradation of the qua...
Gang Qu, Jennifer L. Wong, Miodrag Potkonjak
COMPGEOM
2010
ACM
14 years 16 days ago
Finding shortest non-trivial cycles in directed graphs on surfaces
Let D be a weighted directed graph cellularly embedded in a surface of genus g, orientable or not, possibly with boundary. We describe algorithms to compute a shortest non-contrac...
Sergio Cabello, Éric Colin de Verdiè...
FUZZIEEE
2007
IEEE
14 years 1 months ago
Monitoring the State of a Ubiquitous Robotic System: A Fuzzy Logic Approach
— A trend is emerging in the fields of ambient intelligence (AmI) and autonomous robotics, which points in the direction of a merger between these two fields. The inclusion of ...
Donatella Guarino, Alessandro Saffiotti
STACS
2004
Springer
14 years 24 days ago
On Minimum Circular Arrangement
Motivated by a scheduling problem encountered in multicast environments, we study a vertex labelling problem, called Directed Circular Arrangement (DCA), that requires one to fin...
Murali K. Ganapathy, Sachin Lodha
CIKM
2010
Springer
13 years 6 months ago
SHRINK: a structural clustering algorithm for detecting hierarchical communities in networks
Community detection is an important task for mining the structure and function of complex networks. Generally, there are several different kinds of nodes in a network which are c...
Jianbin Huang, Heli Sun, Jiawei Han, Hongbo Deng, ...