Sciweavers

2642 search results - page 76 / 529
» The development of Chez Scheme
Sort
View
ICIP
2009
IEEE
14 years 11 months ago
Security Evaluation Of Informed Watermarking Schemes
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the se...
KDD
2008
ACM
104views Data Mining» more  KDD 2008»
14 years 10 months ago
Succinct summarization of transactional databases: an overlapped hyperrectangle scheme
Transactional data are ubiquitous. Several methods, including frequent itemsets mining and co-clustering, have been proposed to analyze transactional databases. In this work, we p...
Yang Xiang, Ruoming Jin, David Fuhry, Feodor F. Dr...
APSCC
2008
IEEE
14 years 4 months ago
Analysis of Context-Aware Network Selection Schemes for Power Savings
Socio-technical developments in computing have resulted in the emergence of innovative mobile systems which exploit the information available on the Internet to optimize the perfo...
Pravin Pawar, Bert-Jan van Beijnum, Hermie Hermens...
IAT
2007
IEEE
14 years 4 months ago
Revisiting ADOPT-ing and its Feedback Schemes
Here we revisit ADOPT-ing and bring two new contributions. One contribution consists of developing variations on the algorithms keeping the improvement in length of chain of causa...
Marius-Calin Silaghi, Makoto Yokoo
ESOP
2007
Springer
14 years 4 months ago
Principal Type Schemes for Modular Programs
Abstract. Two of the most prominent features of ML are its expressive module system and its support for Damas-Milner type inference. However, while the foundations of both these fe...
Derek Dreyer, Matthias Blume