• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 3,135
Next 10 →

Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding

by Brian Chen, Gregory W. Wornell - IEEE TRANS. ON INFORMATION THEORY , 1999
"... We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third, "composite" signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing information-embedding rate, mini ..."
Abstract - Cited by 496 (14 self) - Add to MetaCart
refer to as dither modulation. Using deterministic models to evaluate digital watermarking methods, we show that QIM is "provably good" against arbitrary bounded and fully informed attacks, which arise in several copyright applications, and in particular, it achieves provably better rate

Providing Probabilistically-Bounded Approximate Answers to Non-Holistic Aggregate Range Queries

by Alfredo Cuzzocrea, Via P. Bucci
"... A novel framework for providing probabilistically-bounded approximate answers to non-holistic aggregate range queries in OLAP is presented in this paper. Such a framework allows us to efficiently support OLAP applications, as answering queries is the main bottleneck for this kind of applications. To ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
A novel framework for providing probabilistically-bounded approximate answers to non-holistic aggregate range queries in OLAP is presented in this paper. Such a framework allows us to efficiently support OLAP applications, as answering queries is the main bottleneck for this kind of applications

COMPUTING PROBABILISTIC BOUNDS FOR EXTREME EIGENVALUES OF SYMMETRIC MATRICES WITH THE LANCZOS METHOD

by Jos L. M. Van Dorsselaer, Michiel E. Hochstenbach, Henk A. Van Der Vorst , 2000
"... We study the Lanczos method for computing extreme eigenvalues of a symmetric or Hermitian matrix. It is not guaranteed that the extreme Ritz values are close to the extreme eigenvalues|even when the norms of the corresponding residual vectors are small. Assuming that the starting vector has been cho ..."
Abstract - Add to MetaCart
chosen randomly, we compute probabilistic bounds for the extreme eigenvalues from data available during the execution of the Lanczos process. Four dierent types of bounds are obtained using Lanczos, Ritz, and Chebyshev polynomials. These bounds are compared theoretically and numerically. Furthermore we

Probabilistic Bounds on Message Delivery for the Totem Single-Ring Protocol

by L. E. Moser, P. M. Melliar-Smith - In Proceedings of the 15th IEEE Real-Time Systems Symposium , 1994
"... For fault-tolerant real-time distributed systems, the probability that a message is not delivered within its real-time deadline must be small enough that it does not adversely affect system reliability. We investigate the delivery of messages for the Totem Protocol, a reliable ordered broadcast prot ..."
Abstract - Cited by 10 (5 self) - Add to MetaCart
. We present a methodology for determining the probability of satisfying bounds on the latency from message origination to ordered delivery in the presence of communication faults.

Probabilistic Bounds on the Extremal Eigenvalues and Condition Number by the Lanczos Algorithm

by J. Kuczynski, H. Wozniakowski , 1992
"... We analyze the Lanczos algorithm with a random start for approximating the extremal eigenvalues of a symmetric positive definite matrix. We present some bounds on the Lebesgue measure (probability) of the sets of these starting vectors for which the Lanczos algorithm gives at the k-th step satisfact ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
We analyze the Lanczos algorithm with a random start for approximating the extremal eigenvalues of a symmetric positive definite matrix. We present some bounds on the Lebesgue measure (probability) of the sets of these starting vectors for which the Lanczos algorithm gives at the k-th step

Voronoi cells, probabilistic bounds and hypothesis testing in mixed integer linear models

by Peiliang Xu - IEEE Trans. Inf. Theory , 2006
"... (c)2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other ..."
Abstract - Cited by 8 (3 self) - Add to MetaCart
(c)2006 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

A probabilistic bound on the basic role mining problem and its applications

by Alessandro Colantonio , Roberto Di , Pietro , Alberto Ocello , Vincenzo Nino , Verde - Proceedings of the IFIP TC 11 24th International Information Security Conference, SEC '09 in IFIP International Federation for Information Processing , 2009
"... Abstract The aim of this paper is to describe a new probabilistic approach to the role engineering process for RBAC. We address the issue of minimizing the number of roles, problem known in literature as the Basic Role Mining Problem (basicRMP). We leverage the equivalence of the above issue with t ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Abstract The aim of this paper is to describe a new probabilistic approach to the role engineering process for RBAC. We address the issue of minimizing the number of roles, problem known in literature as the Basic Role Mining Problem (basicRMP). We leverage the equivalence of the above issue

Randomized Approximation of the Gram Matrix: Exact Computation and Probabilistic Bounds

by John T. Holodnak, Ilse C. F. Ipsen, A An - SIAM J. Matrix Anal. Appl
"... ar ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract not found

Verification of probabilistic bounded δ-reachability for cyber-physical systems

by Fedor Shmarov, Paolo Zuliani
"... Abstract—Verification of cyber-physical systems is a difficult, yet extremely important, problem. Hybrid systems offer a theoret-ical framework in which to perform formal verification of cyber-physical systems. In this paper we study the problem of bounded δ-reachability in hybrid systems with rando ..."
Abstract - Add to MetaCart
Abstract—Verification of cyber-physical systems is a difficult, yet extremely important, problem. Hybrid systems offer a theoret-ical framework in which to perform formal verification of cyber-physical systems. In this paper we study the problem of bounded δ-reachability in hybrid systems

Model Checking of Probabilistic and Nondeterministic Systems

by Andrea Bianco, Luca De Alfaro , 1995
"... . The temporal logics pCTL and pCTL* have been proposed as tools for the formal specification and verification of probabilistic systems: as they can express quantitative bounds on the probability of system evolutions, they can be used to specify system properties such as reliability and performance. ..."
Abstract - Cited by 291 (13 self) - Add to MetaCart
. The temporal logics pCTL and pCTL* have been proposed as tools for the formal specification and verification of probabilistic systems: as they can express quantitative bounds on the probability of system evolutions, they can be used to specify system properties such as reliability and performance
Next 10 →
Results 11 - 20 of 3,135
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University