Sciweavers

278 search results - page 12 / 56
» Variants of Spreading Messages
Sort
View
GECCO
2006
Springer
134views Optimization» more  GECCO 2006»
13 years 11 months ago
Incorporating directional information within a differential evolution algorithm for multi-objective optimization
The field of Differential Evolution (DE) has demonstrated important advantages in single objective optimization. To date, no previous research has explored how the unique characte...
Antony W. Iorio, Xiaodong Li
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
14 years 5 days ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
ICMCS
2000
IEEE
145views Multimedia» more  ICMCS 2000»
13 years 12 months ago
Staganalysis of LSB Encoding in Color Images
In this paper, we analyze the security of Least Significant Bit (LSB) embedding for hiding messages in high-color-depth digital images. We introduce a powerful steganalytic techni...
Jiri Fridrich, Rui Du, Meng Long
GLOBECOM
2008
IEEE
14 years 2 months ago
Time Dependent Message Spraying for Routing in Intermittently Connected Networks
—Intermittently connected mobile networks, also called Delay Tolerant Networks (DTNs), are wireless networks in which at any given time instance, the probability of having a comp...
Eyuphan Bulut, Zijian Wang, Boleslaw K. Szymanski
WWW
2011
ACM
13 years 2 months ago
Predicting popular messages in Twitter
Social network services have become a viable source of information for users. In Twitter, information deemed important by the community propagates through retweets. Studying the c...
Liangjie Hong, Ovidiu Dan, Brian D. Davison