Zobrazeno 1 - 10
of 174
pro vyhledávání: '"Kalker, Ton"'
Autor:
Kim, MinJi, Lima, Luísa, Zhao, Fang, Barros, Joao, Medard, Muriel, Koetter, Ralf, Kalker, Ton, Han, Keesook
Random linear network coding can be used in peer-to-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. We quantify the impact of Byzantin
Externí odkaz:
http://arxiv.org/abs/0904.2722
Autor:
Fozunbal, Majid, Kalker, Ton
We consider the problem of decision-making with side information and unbounded loss functions. Inspired by probably approximately correct learning model, we use a slightly different model that incorporates the notion of side information in a more gen
Externí odkaz:
http://arxiv.org/abs/cs/0601115
Autor:
de Lima, Amaro A., Prego, Thiago de M., Netto, Sergio L., Lee, Bowon, Said, Amir, Schafer, Ronald W., Kalker, Ton, Fozunbal, Majid
Publikováno v:
In Speech Communication 2012 54(3):393-401
Publikováno v:
In Signal Processing: Image Communication 2004 19(4):325-339
Autor:
Haitsma, Jaap1 Jaap.Haitsma@philips.com, Kalker, Ton1
Publikováno v:
Journal of New Music Research. Jun2003, Vol. 32 Issue 2, p211-221. 11p. 3 Diagrams, 2 Charts, 3 Graphs.
Publikováno v:
Information Hiding ISBN: 9783540653868
Information Hiding
Information Hiding-2nd International Workshop, IH 1998, Proceedings, 329-343
STARTPAGE=329;ENDPAGE=343;TITLE=Information Hiding-2nd International Workshop, IH 1998, Proceedings
Information Hiding
Information Hiding-2nd International Workshop, IH 1998, Proceedings, 329-343
STARTPAGE=329;ENDPAGE=343;TITLE=Information Hiding-2nd International Workshop, IH 1998, Proceedings
Theoretical modeling of watermarks allow prediction of the detector reliability and facilitates the development of more reliable systems. In particular, mathematical evaluation is relevant to estimate the rate at which “false alarms” occur. In th
Publikováno v:
In Pattern Recognition Letters 2012 33(4):373-380
Autor:
Prarthana Shrestha, Kalker, Ton
[TODO] Add abstract here.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::439a56384429a94f27b1682cae6576a4
Publikováno v:
ACM Multimedia 2002 Workshop W2-Workshop on Multimedia and Security: Authentication, Secrecy, and Steganalysis, 15-18
STARTPAGE=15;ENDPAGE=18;TITLE=ACM Multimedia 2002 Workshop W2-Workshop on Multimedia and Security
STARTPAGE=15;ENDPAGE=18;TITLE=ACM Multimedia 2002 Workshop W2-Workshop on Multimedia and Security
An undesirable side effect of many watermarking and data-hiding methods is that the host signal into which auxiliary data is embedded is distorted. Finding an optimal balance between the amount of information embedded and the induced distortion is th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::ba393fcc6bc629756cf78b9c8d990188
https://research.tue.nl/nl/publications/0f313d9b-d302-46da-8fb7-d93e54d3980c
https://research.tue.nl/nl/publications/0f313d9b-d302-46da-8fb7-d93e54d3980c
Publication in the conference proceedings of EUSIPCO, Toulouse, France, 2002
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c6ad67982f443ccb78e63971832cc711