Sciweavers

210 search results - page 29 / 42
» Research on Data Hiding Capacity
Sort
View
USENIX
1993
13 years 11 months ago
HighLight: Using a Log-structured File System for Tertiary Storage Management
Robotic storage devices offer huge storage capacity at a low cost per byte, but with large access times. Integrating these devices into the storage hierarchy presents a challenge ...
John T. Kohl, Carl Staelin, Michael Stonebraker
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
14 years 4 months ago
Quantifying Information Leaks in Outbound Web Traffic
As the Internet grows and network bandwidth continues to increase, administrators are faced with the task of keeping confidential information from leaving their networks. Today’...
Kevin Borders, Atul Prakash
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
14 years 1 months ago
An efficient approach to unbounded bi-objective archives -: introducing the mak_tree algorithm
Given the prominence of elite archiving in contemporary multiobjective optimisation research and the limitations inherent in bounded population sizes, it is unusual that the vast ...
Adam Berry, Peter Vamplew
ICCSA
2005
Springer
14 years 3 months ago
Conceptual Modeling of Genetic Studies and Pharmacogenetics
Genetic Studies examine relationships between genetic variation and disease development. Pharmacogenetics studies the responses to drugs against genetic variation. These two lines ...
Xiaohua Zhou, Il-Yeol Song
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
13 years 12 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...