• Aucun résultat trouvé

[PDF] Top 20 Compositional methods for information-hiding

Has 10000 "Compositional methods for information-hiding" found on our website. Below are the top 20 most common "Compositional methods for information-hiding".

Compositional methods for information-hiding

Compositional methods for information-hiding

... of information flow there have been various works (McLean 1990, James ...high information and the low information are seen as the input and output respectively of a (noisy) ...channel. ... Voir le document complet

28

Quantitative Approaches to Information Hiding

Quantitative Approaches to Information Hiding

... approaches for quantifying information hiding in communication ...their compositional safety, ...some information to the ...our information-hiding systems, whose behaviour ... Voir le document complet

114

Semi-compositional Method for Synonym Extraction of Multi-Word Terms

Semi-compositional Method for Synonym Extraction of Multi-Word Terms

... the information captured using distributional methods is not precisely syn- tactic, nor purely semantic - in some sense the only word that appears is ... Voir le document complet

7

Data Hiding of Motion Information in Chroma and Luma Samples for Video Compression

Data Hiding of Motion Information in Chroma and Luma Samples for Video Compression

... the information coding with Context Adaptive Binary Arithmetic Coding (CABAC), and above all the addition of several Intra and Inter modes with many encoding methods which need the transmission of ... Voir le document complet

6

A Compositional Model for Low-Dimensional Image Set Representation

A Compositional Model for Low-Dimensional Image Set Representation

... To better understand the problem addressed in this paper, consider the following example. Suppose we want to trans- fer the shape of image I 1 to image I 2 (see Figure 1 ). This may require knowing a dense correspondence ... Voir le document complet

9

Using compositional and Dirichlet models for market-share regression

Using compositional and Dirichlet models for market-share regression

... able for the CODA model because it allows to get rid of the cumbersome notations of simplicial ...controlling for the brands average price and a scrapping incentive dummy ...computed for all ... Voir le document complet

21

A high-rate data hiding technique for audio signals based on IntMDCT quantization

A high-rate data hiding technique for audio signals based on IntMDCT quantization

... Data hiding consists in imperceptibly embedding information in a ...data hiding for audio signals is the Digital Rights Management (DRM): the embedded data are usually copyrights or ... Voir le document complet

5

Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding

Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding

... Based on these ideas, we can find [6] the definition of four security classes to rank watermarking schemes security in the WOA framework (see Fig. 1 for relationships among them). The first class is insecurity. In ... Voir le document complet

17

A compositional semantics for the reversible pi-calculus

A compositional semantics for the reversible pi-calculus

... of information that can be pushed on a memory: either a fork symbol h↑i, which allows memory stacks to divide whenever processes are forking, or events which are triplets of the form hi, k, ...αi. For any ... Voir le document complet

11

Compositional Policy Priors

Compositional Policy Priors

... We approach the problem of discovering and exploiting abstract, compositional policy structure from the perspective of probabilistic inference. By defining a stochastic gen- erative model by which optimal ... Voir le document complet

19

A Symmetric Compositional Approach for Adaptive Ubiquitous Systems

A Symmetric Compositional Approach for Adaptive Ubiquitous Systems

... languages for adaptations (ISL4WComp and BSL), to handle these problems ...either for the output of component or for the input of component but not for both interferences ... Voir le document complet

7

Hiding from the climate: Characterizing microrefugia for boreal forest understory species

Hiding from the climate: Characterizing microrefugia for boreal forest understory species

... habitats for species threatened by climate warming, a fairly simple strategy could be to maintain a continuous forest layer on north-facing slopes, in shady depressions and ravines and to keep or establish buffer ... Voir le document complet

14

Compositional and morphological changes for ordered PtxFey/C oxygen electroreduction catalysts

Compositional and morphological changes for ordered PtxFey/C oxygen electroreduction catalysts

... were refined allowing site-disorder on each of the two crystallographic sites, however, constrained overall to the nominal composition. In the Rietveld refinement of each sample, an anisotropic line-broadening was needed ... Voir le document complet

13

Representation Learning of Compositional Data

Representation Learning of Compositional Data

... representation for compo- sitional data. Compositional data consists of a collection of nonnegative data that sum to a constant ...Instead, compositional data must be first transformed before ...from ... Voir le document complet

12

Compositional Verification of Evolving SPL

Compositional Verification of Evolving SPL

... 2.1.1 Requirement against Design In the requirement of a product line, the variability is usually discussed in terms of variation points, which are at a high level of abstraction and focused on clarity and ... Voir le document complet

35

Compositional equivalences based on open pNets

Compositional equivalences based on open pNets

... way, for example in the area of parallel skeletons, or distributed ...support for computing the symbolic semantics in term of open automata [12], and have developed algorithms to check strong ... Voir le document complet

73

Compositional Analyses of Leda Clay

Compositional Analyses of Leda Clay

... Knowledge of the mineral comDosition of a soil is an aid in the interpretation of its engineering properties and the analysis of composition was a logical step in the study of Leda clay [r] ... Voir le document complet

11

Distributed data hiding in multi-cloud storage environment

Distributed data hiding in multi-cloud storage environment

... scheme for secret distribution resistant to ...by hiding the exist- ence of the covert channel between the communicating ...necessary for the secret ...both for secret insertion and ... Voir le document complet

16

Compositional Abstraction-based Synthesis for Cascade Discrete-Time Control Systems

Compositional Abstraction-based Synthesis for Cascade Discrete-Time Control Systems

... a compositional synthesis methodology for discrete-time cascade interconnected sys- ...provided compositional results based on ap- proximate (alternating) simulation relations, and showed how this ... Voir le document complet

7

Compositional and Contract-based Verification for Autonomous Driving on Road Networks

Compositional and Contract-based Verification for Autonomous Driving on Road Networks

... intractable for large complex ...Checking for safety of a given controller over a city, ...repeated for each controller we want to verify, thus heavily limiting ...controllers for autonomous ... Voir le document complet

17

Show all 10000 documents...