Sciweavers

351 search results - page 15 / 71
» Perfect Constraints Are Tractable
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 7 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
CMOT
2000
105views more  CMOT 2000»
13 years 7 months ago
Generation Supply Bidding in Perfectly Competitive Electricity Markets
This paper reports on the development of a comprehensive framework for the analysis and formulation of bids in competitive electricity markets. Competing entities submit offers of...
George Gross, David Finlay
SCESM
2006
ACM
238views Algorithms» more  SCESM 2006»
14 years 1 months ago
Nobody's perfect: interactive synthesis from parametrized real-time scenarios
As technical systems keep growing more complex and sophisticated, designing software for the safety-critical coordination between their components becomes increasingly difficult....
Holger Giese, Stefan Henkler, Martin Hirsch, Flori...
ICASSP
2011
IEEE
12 years 11 months ago
Transmit and receive filters for MISO FBMC systems subjected to power constraints
Build upon the OFDM/OQAM scheme this paper addresses the design of linear transmit and receive filters. Aiming at enhancing the robustness against multipath fading, two novel tec...
Marius Caus, Ana I. Pérez-Neira
CP
2000
Springer
13 years 12 months ago
Automatic Generation of Propagation Rules for Finite Domains
plexity Theorems: Talk Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 David McAllester Regular Papers Automatic Generation of Propagation Rules for F...
Slim Abdennadher, Christophe Rigotti