There are many detectors for simple Least Significant Bit (LSB) steganography in digital images, the most sensitive of which make use of structural or combinatorial properties of ...
This paper proposes an efficient algorithm that produces near-optimal discrete bit-loading for a Gaussian interference channel that models a DSL network. It first takes a continuou...
Abstract--The closed-form exact bit error rate (BER) expressions of generalized orthogonal space-time block codes (OSTBCs) are first derived for quadrature amplitude modulation (QA...
Managing scientific data warehouses requires constant adaptations to cope with changes in processing algorithms, computing environments, database schemas, and usage patterns. We h...
Etzard Stolte, Christoph von Praun, Gustavo Alonso...
Set theories are traditionally based on first-order logic. We show that in a constructive setting, basing a set theory on a dependent logic yields many benefits. To this end, we...