Filters








37 Hits in 13.6 sec

On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques

Arezou Soltani Panah, Ron Van Schyndel, Timos Sellis, Elisa Bertino
2016 IEEE Access  
INDEX TERMS Digital watermarking, information hiding, data mining, data security, big data.  ...  For example, a loose definition of robustness might be in terms of the resilience of a watermark against normal host data operations, and of invisibility as resilience of the data interpretation against  ...  Data Cubes: A data cube is a multidimensional data model designed for providing aggregate information. Guo et al.  ... 
doi:10.1109/access.2016.2570812 fatcat:2xxteahvprepzekaqqbbyey7hi

Three-Dimensional Mesh Steganography and Steganalysis: A Review [article]

Hang Zhou, Weiming Zhang, Kejiang Chen, Weixiang Li, Nenghai Yu
2021 arXiv   pre-print
In this article, we provide a systematic survey of the literature on 3-D mesh steganography and steganalysis.  ...  Over the past decade, 3-D meshes have emerged in industrial, medical, and entertainment applications, being of large practical significance for 3-D mesh steganography and steganalysis.  ...  A large number of steganography schemes for meshes create multiple two-state domains and embed messages by aligning together the state information and message bit.  ... 
arXiv:2104.10203v1 fatcat:55z2mdrgtvhy3pb63c4ai6gbdy

Integrating Memory Compression and Decompression with Coherence Protocols in Distributed Shared Memory Multiprocessors

Lakshmana Rao Vittanala, Mainak Chaudhuri
2007 Proceedings of the International Conference on Parallel Processing  
We design a lowoverhead compression scheme based on frequent patterns and zero runs present in the evicted dirty L2 cache blocks.  ...  Our customized algorithm for handling completely zero cache blocks helps hide a significant amount of memory access latency.  ...  The profile-driven scheme builds a CAM dictionary from profile information and maintains a RAM for decompression, while the online differential scheme relies on the fact that several bits in different  ... 
doi:10.1109/icpp.2007.51 dblp:conf/icpp/VittanalaC07 fatcat:ongknnmj4je6dexzcxcjaxycwm

The Design and Performance of a Pluggable Protocols Framework for Real-Time Distributed Object Computing Middleware [chapter]

Carlos O'Ryan, Fred Kuhns, Douglas C. Schmidt, Ossama Othman, Jeff Parsons
2000 Lecture Notes in Computer Science  
These results illustrate that (1) DOC middleware performance is largely an implementation detail and (2) the next-generation of optimized, standards-based CORBA middleware can replace ad hoc and proprietary  ...  In particular, the overall roundtrip latency of a TAO two-way method invocation using the standard inter-ORB protocol and using a commercial, off-the-self Pentium II Xeon 400 MHz workstation running in  ...  For complicated data types, such as a large sequence of structs, ORB overhead is particularly prevalent.  ... 
doi:10.1007/3-540-45559-0_19 fatcat:arpdla7r6zajfgb5zksgkgqcnu

Exploring virtual network selection algorithms in DSM cache coherence protocols

M. Chaudhuri, M. Heinrich
2004 IEEE Transactions on Parallel and Distributed Systems  
To keep the coherence protocol simple, messages are usually assigned to virtual lanes in a predefined static manner based on a cycle-free lane assignment dependence graph.  ...  We achieve this by exposing the selection algorithms to the coherence protocol itself, so that it can inject messages into selected virtual lanes based on some local information, and still enjoy deadlock-freedom  ...  One message is composed of a 64-bit header, a 64-bit address, and optional data payload up to 128 bytes, which is the coherence granularity.  ... 
doi:10.1109/tpds.2004.35 fatcat:6v2dw7ipuzec5ndxrlkbmc75pe

Big Graph Analytics Platforms

Da Yan, Yingyi Bu, Yuanyuan Tian, Amol Deshpande
2017 Foundations and Trends in Databases  
Note that each element (u, v, w) in the cube corresponds to an edge in G, and thus a partitioning of the cube is also a partitioning of the edges in G.  ...  There is also a large body of work on executing queries related to a specific vertex (or a small subset of vertices) against large volumes of graph data, which has developed a range of specialized indexes  ...  Out-of-Core SSD-Based Systems  ... 
doi:10.1561/1900000056 fatcat:ucqrtzo4q5g2lpj6dmp7jv3e5m

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+36 others)
2016 unpublished
Acknowledgments This research was supported in part by the National Nature Science Foundation of China (grant number: 61202228) and the College Natural Science Key Project of Anhui Province of China (grant  ...  Acknowledgments The research work was supported by New Century Excellent Talents Acknowledgments The work described in this paper was supported by the Key program of National Science Fund of Tianjin  ...  However, large payloads would incur a greater level of distortion as a result of this method.  ... 
fatcat:xjcy7wc2hzbhzl3bfxwniqvjhy

ConVRgence (VRIC) Virtual Reality International Conference Proceedings

Simon Richir
2020 International Journal of Virtual Reality  
This research application uses a 3D model data "Miraikomachi" under the following usage guideline.  ...  Acknowledgments This part of the work is done within the framework of the NUMERILAB project, supported by FEDER and the NORMANDY REGION.  ...  However, we designed a control scheme that is based on the positions of the wands rather than buttons, to provide a gameplay based highly on body movements of the user.  ... 
doi:10.20870/ijvr.2020...3316 fatcat:d4dsvhql3ba5ros3xke2wb3efy

Examples of Risk Information Concealment Practice [chapter]

Dmitry Chernov, Didier Sornette
2016 Man-made Catastrophes and Risk Information Concealment  
In March 1959 in the nearby Pontesei dam reservoir (owned by SADE), a landslide of 10 million m 3 of rock occurred (equivalent of cube with a 220 m side), resulting in the death of one worker, killed by  ...  a 20-m wave which overtopped the dam and destroyed a nearby bridge.  ...  In October 1963, a large landslide of 260 million m 3 of rock (equivalent of cube with a 650 m side) filled the reservoir of the dam, initiating a 150-250 m high wave, which overtopped the dam and wiped  ... 
doi:10.1007/978-3-319-24301-6_2 fatcat:w42ofgavczhvvbppbdkxzsin7m

Software integration in mobile robotics, a science to scale up machine intelligence

Stéphane Magnenat
2010
world in real time on a miniature robot is demanding.  ...  only combining basic components that are individually slightly behind the state of the art.  ...  On the contrary, mobile robots have a very large and loosely structured information input space and a large repertoire of behaviours.  ... 
doi:10.5075/epfl-thesis-4783 fatcat:mbxywsovvvbvnfe5a4we7cbh2q

A Defense of (s)crappy Robots [article]

Ryan Jenkins, Mairéad Hurley, Eva Durall, Sebastian Martin
2020 Zenodo  
The experience of trying the activity as a learner will inform a discussion about the qualities of learning that we noticed in the w [...]  ...  When the parts of a kit fit together perfectly, learners are less likely to develop skills around iteration, problem posing, collaboration and development of understanding.  ...  The activity in this paper showed just one approach to using ML-ABM in education: to increase complexity by adding a level in the form of a model.  ... 
doi:10.5281/zenodo.5501878 fatcat:snjtztj37fbbpeszscwhk63uj4

Mapping and management of communication services on MP-SoC platforms [article]

Marescaux, TM (Théodore), Corporaal, H (Henk), Verkest, DTML (Diederik)
2007
QoS is provided by a fair bandwidth allocation scheme (TDMA-based) [112] .  ...  An encapsulated block of data at the network layer in packet-switched networks is called a packet and is composed of a packet header containing routing information, of a packet body containing payload  ...  A simulation-based approach is thus desirable as a first step for validation of application mapping and platform exploration.  ... 
doi:10.6100/ir629360 fatcat:e5kz6vvr7fguldjhdpjyge3u34

Hypersonic aerothermodynamics of satellite demise

Thomas W Rees, Paul Bruce, European Space Agency, Fluid Gravity Engineering, Engineering And Physical Sciences Research Council
2021
The CFD simulations were experimentally validated with wind tunnel measurements of the Stanton number distribution over a cube.  ...  The current generation of heating models are usually based on correlations developed for shapes such as flat plates and hemispheres.  ...  Acknowledgements So apparently it takes a village. First, Paul Bruce and Jim Merrifield provided both excellent technical advice and helped push/pull/drag me in the right direction when necessary.  ... 
doi:10.25560/86618 fatcat:hpnbdqubwjeqhnr3vnvlbmrt3a

Automating Abstract Interpretation of Abstract Machines [article]

James Ian Johnson
2015 arXiv   pre-print
The semantics guarantees that if allocation is finite, then the semantics is a sound and computable approximation of the concrete semantics.  ...  This thesis investigates a systematic method of creating abstract interpreters from traditional interpreters, called Abstracting Abstract Machines.  ...  in a cube (used in [105, 39] ).  ... 
arXiv:1504.08033v1 fatcat:qoppf36sxfhpto7avqoeebauda

Coimbatore-6410 4243

Tadeusz Hryniewicz, Tomasz Borowski, B Ramani, Anand Paul, Mr Kumar, Mr Ravichandran Advisor, T Devi, Latha Parameswaran, Chairperson, Ms Sampath, Ms Shaju, Mr Prashanth
unpublished
Industry-specific protocol filtering and deep packet inspection capabilities are required to identify malicious payloads hiding in non-IT protocols. 9.  ...  Semantic based Information Retrieval Xiaomin Ning [9] present SemreX which implements the retrieval of literature on a large scale efficiently and a single access point are browsed.  ...  LOCAL vs EXTENDED The attacker makes control of various base stations or any vehicles to an local network is said to be an Local attacker, whereas the extended attacker makes control of a variety of base  ... 
fatcat:bq2eelzqujhjzfn6qevs75mdim
« Previous Showing results 1 — 15 out of 37 results