Sciweavers

13043 search results - page 2312 / 2609
» Simulation of the research process
Sort
View
JEI
2002
152views more  JEI 2002»
15 years 4 months ago
Cryptanalysis of the Yeung - Mintzer fragile watermarking technique
The recent proliferation of digital multimedia content has raised concerns about authentication mechanisms for multimedia data. A number of authentication techniques based on digi...
Jessica J. Fridrich, Miroslav Goljan, Nasir Memon
JMLR
2002
125views more  JMLR 2002»
15 years 4 months ago
Lyapunov Design for Safe Reinforcement Learning
Lyapunov design methods are used widely in control engineering to design controllers that achieve qualitative objectives, such as stabilizing a system or maintaining a system'...
Theodore J. Perkins, Andrew G. Barto
MAM
2002
63views more  MAM 2002»
15 years 4 months ago
OPTS: increasing branch prediction accuracy under context switch
Accurate branch prediction is essential for obtaining high performance in pipelined superscalar processors. Though many dynamic branch predictors have been proposed to obtain high...
Moon-Sang Lee, Young-Jae Kang, Joonwon Lee, Seung ...
STTT
1998
130views more  STTT 1998»
15 years 4 months ago
The Practitioner's Guide to Coloured Petri Nets
Abstract. Coloured Petri nets (CP-nets or CPNs) provide a framework for the design, specification, validation, and verification of systems. CP-nets have a wide range of applicati...
Lars Michael Kristensen, Søren Christensen,...
SIGMETRICS
2002
ACM
107views Hardware» more  SIGMETRICS 2002»
15 years 4 months ago
Passage time distributions in large Markov chains
Probability distributions of response times are important in the design and analysis of transaction processing systems and computercommunication systems. We present a general tech...
Peter G. Harrison, William J. Knottenbelt
« Prev « First page 2312 / 2609 Last » Next »