Sciweavers

21520 search results - page 4107 / 4304
» Symmetric network computation
Sort
View
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
15 years 2 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
GIS
2010
ACM
15 years 2 months ago
Efficient indexing structure for scalable processing of spatial alarms
Spatial Alarms are reminders for mobile users upon their arrival of certain spatial location of interest. Spatial alarm processing requires meeting two demanding objectives: high ...
Myungcheol Doo, Ling Liu, Nitya Narasimhan, Venu V...
156
Voted
IAT
2010
IEEE
15 years 2 months ago
Using Negotiation to Reduce Redundant Autonomous Mobile Program Movements
Distributed load managers exhibit thrashing where tasks are repeatedly moved between locations due to incomplete global load information. This paper shows that systems of Autonomou...
Natalia Chechina, Peter King, Phil Trinder
150
Voted
ICASSP
2010
IEEE
15 years 2 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...
ICIP
2010
IEEE
15 years 2 months ago
Reduced-reference SSIM estimation
The structural similarity (SSIM) index has been shown to be a good perceptual image quality predictor. In many real-world applications such as network visual communications, howev...
Abdul Rehman, Zhou Wang
« Prev « First page 4107 / 4304 Last » Next »