Sciweavers

694 search results - page 57 / 139
» The Power of the Middle Bit
Sort
View
IH
2005
Springer
14 years 1 months ago
A General Framework for Structural Steganalysis of LSB Replacement
There are many detectors for simple Least Significant Bit (LSB) steganography in digital images, the most sensitive of which make use of structural or combinatorial properties of ...
Andrew D. Ker
ICC
2007
IEEE
105views Communications» more  ICC 2007»
13 years 12 months ago
Multiuser Discrete Bit-loading for Digital Subscriber Lines
This paper proposes an efficient algorithm that produces near-optimal discrete bit-loading for a Gaussian interference channel that models a DSL network. It first takes a continuou...
David D. Yu, Kibeom Seong, John M. Cioffi
TWC
2008
111views more  TWC 2008»
13 years 7 months ago
Closed-Form Exact BER and Optimization of Generalized Orthogonal STBCs
Abstract--The closed-form exact bit error rate (BER) expressions of generalized orthogonal space-time block codes (OSTBCs) are first derived for quadrature amplitude modulation (QA...
Il-Min Kim, Dongwoo Kim
SIGMOD
2003
ACM
160views Database» more  SIGMOD 2003»
14 years 8 months ago
Scientific Data Repositories: Designing for a Moving Target
Managing scientific data warehouses requires constant adaptations to cope with changes in processing algorithms, computing environments, database schemas, and usage patterns. We h...
Etzard Stolte, Christoph von Praun, Gustavo Alonso...
LICS
2007
IEEE
14 years 2 months ago
A Dependent Set Theory
Set theories are traditionally based on first-order logic. We show that in a constructive setting, basing a set theory on a dependent logic yields many benefits. To this end, we...
Wojciech Moczydlowski