Sciweavers

CORR
2010
Springer
93views Education» more  CORR 2010»
13 years 7 months ago
On MMSE and MAP Denoising Under Sparse Representation Modeling Over a Unitary Dictionary
Among the many ways to model signals, a recent approach that draws considerable attention is sparse representation modeling. In this model, the signal is assumed to be generated a...
Javier Turek, Irad Yavneh, Matan Protter, Michael ...
CORR
2010
Springer
146views Education» more  CORR 2010»
13 years 7 months ago
Adaptive Submodularity: A New Approach to Active Learning and Stochastic Optimization
Solving stochastic optimization problems under partial observability, where one needs to adaptively make decisions with uncertain outcomes, is a fundamental but notoriously diffic...
Daniel Golovin, Andreas Krause
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 7 months ago
An LSB Data Hiding Technique Using Natural Numbers
In this paper, a novel data hiding technique is proposed, as an improvement over the Fibonacci LSB data-hiding technique proposed by Battisti et al. [1] based on decomposition of ...
Sandipan Dey, Ajith Abraham, Sugata Sanyal
CORR
2010
Springer
208views Education» more  CORR 2010»
13 years 7 months ago
Bounded Model Checking of Multi-threaded Software using SMT solvers
The transition from single-core to multi-core processors has made multi-threaded software an important subject in computer aided verification. Here, we describe and evaluate an ex...
Lucas Cordeiro, Bernd Fischer 0002
CORR
2010
Springer
44views Education» more  CORR 2010»
13 years 7 months ago
Simulating Customer Experience and Word Of Mouth in Retail - A Case Study
Peer-Olaf Siebers, Uwe Aickelin, Helen Celia, Chri...
CORR
2010
Springer
83views Education» more  CORR 2010»
13 years 7 months ago
Multi-Agent Simulation and Management Practices
Peer-Olaf Siebers, Uwe Aickelin, Helen Celia, Chri...
CORR
2010
Springer
198views Education» more  CORR 2010»
13 years 7 months ago
Downlink Interference Alignment
We develop an interference alignment (IA) technique for a downlink cellular system. In the uplink, IA schemes need channel-state-information exchange across base-stations of diffe...
Changho Suh, Minnie Ho, David Tse
CORR
2010
Springer
181views Education» more  CORR 2010»
13 years 7 months ago
Data Hiding Techniques Using Prime and Natural Numbers
In this paper, a few novel data hiding techniques are proposed. These techniques are improvements over the classical LSB data hiding technique and the Fibonacci LSB data-hiding te...
Sandipan Dey, Ajith Abraham, Bijoy Bandyopadhyay, ...
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 7 months ago
An HTTP-Based Versioning Mechanism for Linked Data
Dereferencing a URI returns a representation of the current state of the resource identified by that URI. But, on the Web representations of prior states of a resource are also av...
Herbert Van de Sompel, Robert Sanderson, Michael L...