Sciweavers

3317 search results - page 661 / 664
» Strategies in Rigid-Variable Methods
Sort
View
JAIR
2008
135views more  JAIR 2008»
13 years 8 months ago
On Similarities between Inference in Game Theory and Machine Learning
In this paper, we elucidate the equivalence between inference in game theory and machine learning. Our aim in so doing is to establish an equivalent vocabulary between the two dom...
Iead Rezek, David S. Leslie, Steven Reece, Stephen...
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 8 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
ISI
2006
Springer
13 years 8 months ago
Measures to Detect Word Substitution in Intercepted Communication
Abstract. Those who want to conceal the content of their communications can do so by replacing words that might trigger attention by other words or locutions that seem more ordinar...
SzeWang Fong, David B. Skillicorn, Dmitri Roussino...
JNW
2008
71views more  JNW 2008»
13 years 8 months ago
Enhancement of Delivery of Warning Messages for Mobile Networks
Vehicle-to-vehicle (V2V) communication systems have been studied extensively in recent years by transportation experts worldwide. Such systems enable the transmission of warning me...
Chia-Sheng Tsai, Wun-Kai Du
JNW
2008
173views more  JNW 2008»
13 years 8 months ago
Dominating Set Theory based Semantic Overlay Networks for Efficient and Resilient Content Distribution
Recently overlay networks have emerged as an efficient and flexible method for content distribution. An overlay network is a network running on top of another network, usually the ...
J. Amutharaj, S. Radhakrishnan