Sciweavers

1236 search results - page 144 / 248
» fast 2010
Sort
View
MASCOTS
2010
15 years 5 months ago
Efficient Discovery of Loop Nests in Execution Traces
Execution and communication traces are central to performance modeling and analysis. Since the traces can be very long, meaningful compression and extraction of representative beha...
Qiang Xu, Jaspal Subhlok, Nathaniel Hammen
MEDIAFORENSICS
2010
15 years 5 months ago
Minimizing embedding impact in steganography using trellis-coded quantization
In this paper, we propose a practical approach to minimizing embedding impact in steganography based on syndrome coding and trellis-coded quantization and contrast its performance...
Tomás Filler, Jan Judas, Jessica J. Fridric...
CMS
2001
119views Communications» more  CMS 2001»
15 years 5 months ago
Vulnerabilities and Security Limitations of current IP Telephony Systems
Abstract Within the traditional telephone system a certain level of quality and security has been established over the years. If we try to use IP Telephony systems as a core part o...
Ralf Ackermann, Markus Schumacher, Utz Roedig, Ral...
BMCBI
2010
123views more  BMCBI 2010»
15 years 4 months ago
Computationally efficient flux variability analysis
Background: Flux variability analysis is often used to determine robustness of metabolic models in various simulation conditions. However, its use has been somehow limited by the ...
Steinn Gudmundsson, Ines Thiele
CVIU
2010
115views more  CVIU 2010»
15 years 4 months ago
A modified model for the Lobula Giant Movement Detector and its FPGA implementation
Bio-inspired vision sensors are particularly appropriate candidates for navigation of vehicles or mobile robots due to their computational simplicity, allowing compact hardware im...
Hongying Meng, Kofi Appiah, Shigang Yue, Andrew Hu...