Sciweavers

280 search results - page 36 / 56
» see 2010
Sort
View
ACSAC
2010
IEEE
13 years 8 months ago
A multi-user steganographic file system on untrusted shared storage
Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such ...
Jin Han, Meng Pan, Debin Gao, HweeHwa Pang
ATMOS
2010
169views Optimization» more  ATMOS 2010»
13 years 8 months ago
Traffic Signal Optimization Using Cyclically Expanded Networks
Traditionally, the coordination of multiple traffic signals and the traffic assignment problem in an urban street network are considered as two separate optimization problems. How...
Ekkehard Köhler, Martin Strehler
BMVC
2010
13 years 8 months ago
Calibration of Non-Overlapping Cameras---Application to Vision-Based Robotics
Multi-camera systems are more and more used in vision-based robotics. An accurate extrinsic calibration is usually required. In most of cases, this task is done by matching featur...
Pierre Lébraly, Eric Royer, Omar Ait-Aider,...
CPAIOR
2010
Springer
13 years 8 months ago
Lazy Clause Generation: Combining the Power of SAT and CP (and MIP?) Solving
Finite domain propagation solving, the basis of constraint programming (CP) solvers, allows building very high-level models of problems, and using highly specific inference encapsu...
Peter J. Stuckey
GLOBECOM
2010
IEEE
13 years 7 months ago
Adaptive Modulation in Wireless Networks with Smoothed Flow Utility
We investigate flow rate optimization on a wireless link with randomly varying channel gain using techniques from adaptive modulation and network utility maximization. We consider ...
Ekine Akuiyibo, Stephen P. Boyd, Daniel O'Neill