Results 51 to 60 of about 335,663 (179)
Research of embedding algorithm for wireless network virtualization
Wireless network virtualization has become one of the promising techniques in fifth generation mobile networks (5G),and the virtual network embedding plays a very important role.A model was formulated to describe the problem and a wireless virtual ...
Bin CAO, Shi-chao XIA, Fang HE, Yun LI
doaj
SpecRp: A spectral-based community embedding algorithm
Community embeddings are useful in node classification since they allow nodes to aggregate relevant information regarding the network structure. Modularity maximization-based algorithms are the most common approach to detect communities in networks ...
Camila P.S. Tautenhain +1 more
doaj +1 more source
We describe an algorithm for computing certain quaternionic quotients of the Bruhat-Tits tree for GL2(Qp). As an application, we describe an algorithm to obtain (conjectural) equations for the canonical embedding of Shimura curves.Comment: Accepted for ...
Boutot +4 more
core +1 more source
A near-optimal approximation algorithm for Asymmetric TSP on embedded graphs
We present a near-optimal polynomial-time approximation algorithm for the asymmetric traveling salesman problem for graphs of bounded orientable or non-orientable genus.
Erickson, Jeff, Sidiropoulos, Anastasios
core +1 more source
High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing
To improve the security, robustness and embedding rate of reversible hiding in encrypted domain in the distributed environment, a multiple embedding algorithm based on cipher-feedback secret sharing was proposed.Firstly, the additional data were embedded
Minqing ZHANG +4 more
doaj +2 more sources
Reversible Information Hiding Algorithm in Encrypted Domain Based on Difference Histogram Shifting [PDF]
The embedding capacity of the current difference histogram shifting algorithm is low.To cope with this problem,we propose a large-capacity reversible data hiding algorithm in encrypted domain.First,we use the single homomorphic encryption to enable a ...
LI Zhijia, XIA Wei
doaj +1 more source
Optimal embedding parameters: A modelling paradigm
Reconstruction of a dynamical system from a time series requires the selection of two parameters, the embedding dimension $d_e$ and the embedding lag $\tau$. Many competing criteria to select these parameters exist, and all are heuristic.
C.K. Tse +16 more
core +1 more source
An Exact Algorithm for Minimum Distortion Embedding [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Fomin, Fedor V. +2 more
openaire +1 more source
Adaptive JPEG steganography based on distortion cost updating
Previous adaptive JPEG steganography algorithms mostly calculate image distortion before secret information embedding,so they can’t dynamically adjust distortion costs.Considering the mutual impacts during embedding,an adaptive JPEG steganography ...
Guang-ming TANG +3 more
doaj +2 more sources
Errors in graph embedding algorithms
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Myrvold, Wendy, Kocay, William
openaire +2 more sources

