[PDF] Top 20 Compositional methods for information-hiding
Has 10000 "Compositional methods for information-hiding" found on our website. Below are the top 20 most common "Compositional methods for information-hiding".
Compositional methods for information-hiding
... of information flow there have been various works (McLean 1990, James ...high information and the low information are seen as the input and output respectively of a (noisy) ...channel. ... Voir le document complet
28
Quantitative Approaches to Information Hiding
... approaches for quantifying information hiding in communication ...their compositional safety, ...some information to the ...our information-hiding systems, whose behaviour ... Voir le document complet
114
Semi-compositional Method for Synonym Extraction of Multi-Word Terms
... the information captured using distributional methods is not precisely syn- tactic, nor purely semantic - in some sense the only word that appears is ... Voir le document complet
7
Data Hiding of Motion Information in Chroma and Luma Samples for Video Compression
... the information coding with Context Adaptive Binary Arithmetic Coding (CABAC), and above all the addition of several Intra and Inter modes with many encoding methods which need the transmission of ... Voir le document complet
6
A Compositional Model for Low-Dimensional Image Set Representation
... To better understand the problem addressed in this paper, consider the following example. Suppose we want to trans- fer the shape of image I 1 to image I 2 (see Figure 1 ). This may require knowing a dense correspondence ... Voir le document complet
9
Using compositional and Dirichlet models for market-share regression
... able for the CODA model because it allows to get rid of the cumbersome notations of simplicial ...controlling for the brands average price and a scrapping incentive dummy ...computed for all ... Voir le document complet
21
A high-rate data hiding technique for audio signals based on IntMDCT quantization
... Data hiding consists in imperceptibly embedding information in a ...data hiding for audio signals is the Digital Rights Management (DRM): the embedded data are usually copyrights or ... Voir le document complet
5
Distortion Optimization of Model-Based Secure Embedding Schemes for Data-Hiding
... Based on these ideas, we can find [6] the definition of four security classes to rank watermarking schemes security in the WOA framework (see Fig. 1 for relationships among them). The first class is insecurity. In ... Voir le document complet
17
A compositional semantics for the reversible pi-calculus
... of information that can be pushed on a memory: either a fork symbol h↑i, which allows memory stacks to divide whenever processes are forking, or events which are triplets of the form hi, k, ...αi. For any ... Voir le document complet
11
Compositional Policy Priors
... We approach the problem of discovering and exploiting abstract, compositional policy structure from the perspective of probabilistic inference. By defining a stochastic gen- erative model by which optimal ... Voir le document complet
19
A Symmetric Compositional Approach for Adaptive Ubiquitous Systems
... languages for adaptations (ISL4WComp and BSL), to handle these problems ...either for the output of component or for the input of component but not for both interferences ... Voir le document complet
7
Hiding from the climate: Characterizing microrefugia for boreal forest understory species
... habitats for species threatened by climate warming, a fairly simple strategy could be to maintain a continuous forest layer on north-facing slopes, in shady depressions and ravines and to keep or establish buffer ... Voir le document complet
14
Compositional and morphological changes for ordered PtxFey/C oxygen electroreduction catalysts
... were refined allowing site-disorder on each of the two crystallographic sites, however, constrained overall to the nominal composition. In the Rietveld refinement of each sample, an anisotropic line-broadening was needed ... Voir le document complet
13
Representation Learning of Compositional Data
... representation for compo- sitional data. Compositional data consists of a collection of nonnegative data that sum to a constant ...Instead, compositional data must be first transformed before ...from ... Voir le document complet
12
Compositional Verification of Evolving SPL
... 2.1.1 Requirement against Design In the requirement of a product line, the variability is usually discussed in terms of variation points, which are at a high level of abstraction and focused on clarity and ... Voir le document complet
35
Compositional equivalences based on open pNets
... way, for example in the area of parallel skeletons, or distributed ...support for computing the symbolic semantics in term of open automata [12], and have developed algorithms to check strong ... Voir le document complet
73
Compositional Analyses of Leda Clay
... Knowledge of the mineral comDosition of a soil is an aid in the interpretation of its engineering properties and the analysis of composition was a logical step in the study of Leda clay [r] ... Voir le document complet
11
Distributed data hiding in multi-cloud storage environment
... scheme for secret distribution resistant to ...by hiding the exist- ence of the covert channel between the communicating ...necessary for the secret ...both for secret insertion and ... Voir le document complet
16
Compositional Abstraction-based Synthesis for Cascade Discrete-Time Control Systems
... a compositional synthesis methodology for discrete-time cascade interconnected sys- ...provided compositional results based on ap- proximate (alternating) simulation relations, and showed how this ... Voir le document complet
7
Compositional and Contract-based Verification for Autonomous Driving on Road Networks
... intractable for large complex ...Checking for safety of a given controller over a city, ...repeated for each controller we want to verify, thus heavily limiting ...controllers for autonomous ... Voir le document complet
17
Sujets connexes