Sciweavers

3317 search results - page 145 / 664
» Strategies in Rigid-Variable Methods
Sort
View
IWDW
2007
Springer
15 years 10 months ago
Dither Modulation in the Logarithmic Domain
Abstract. Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ru...
Pedro Comesaña, Fernando Pérez-Gonz&...
GECCO
2005
Springer
107views Optimization» more  GECCO 2005»
15 years 10 months ago
Exposing origin-seeking bias in PSO
We discuss testing methods for exposing origin-seeking bias in PSO motion algorithms. The strategy of resizing the initialization space, proposed by Gehlhaar and Fogel and made po...
Christopher K. Monson, Kevin D. Seppi
SACRYPT
2001
Springer
130views Cryptology» more  SACRYPT 2001»
15 years 9 months ago
Algorithms for Multi-exponentiation
This paper compares different approaches for computing power products 1≤i≤k gei i in finite groups. We look at the conventional simultaneous exponentiation approach and prese...
Bodo Möller
ASSETS
2010
ACM
15 years 4 months ago
A web-based user survey for evaluating power saving strategies for deaf users of mobileASL
MobileASL is a video compression project for two-way, real-time video communication on cell phones, allowing Deaf people to communicate in the language most accessible to them, Am...
Jessica J. Tran, Tressa W. Johnson, Joy Kim, Rafae...
BMCBI
2006
108views more  BMCBI 2006»
15 years 4 months ago
A new pooling strategy for high-throughput screening: the Shifted Transversal Design
Background: In binary high-throughput screening projects where the goal is the identification of low-frequency events, beyond the obvious issue of efficiency, false positives and ...
Nicolas Thierry-Mieg