Academic literature on the topic 'Embedding a vector of bits'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Embedding a vector of bits.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Embedding a vector of bits"
Yang, Zekun, and Juan Feng. "A Causal Inference Method for Reducing Gender Bias in Word Embedding Relations." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 9434–41. http://dx.doi.org/10.1609/aaai.v34i05.6486.
Full textLee, Jiann-Der, Yaw-Hwang Chiou, and Jing-Ming Guo. "Reversible Data Hiding Scheme with High Embedding Capacity Using Semi-Indicator-Free Strategy." Mathematical Problems in Engineering 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/476181.
Full textD R, Vinay, and Ananda Babu J. "A Novel Secure Data Hiding Technique into Video Sequences Using RVIHS." International Journal of Computer Network and Information Security 13, no. 2 (April 8, 2021): 53–65. http://dx.doi.org/10.5815/ijcnis.2021.02.05.
Full textLauscher, Anne, Goran Glavaš, Simone Paolo Ponzetto, and Ivan Vulić. "A General Framework for Implicit and Explicit Debiasing of Distributional Word Vector Spaces." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 8131–38. http://dx.doi.org/10.1609/aaai.v34i05.6325.
Full textTissier, Julien, Christophe Gravier, and Amaury Habrard. "Near-Lossless Binarization of Word Embeddings." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 7104–11. http://dx.doi.org/10.1609/aaai.v33i01.33017104.
Full textK., Akubuilo, and Rix Torimiro. "LARGE DATA EMBEDDING; PROBLEM & SOLUTION." Engineering Science & Technology Journal 1, no. 2 (December 29, 2019): 18–22. http://dx.doi.org/10.51594/estj.v1i2.114.
Full textCao, Fang, Yujie Fu, Heng Yao, Mian Zou, Jian Li, and Chuan Qin. "Separable Reversible Data Hiding in Encrypted VQ-Encoded Images." Security and Communication Networks 2022 (April 23, 2022): 1–16. http://dx.doi.org/10.1155/2022/1227926.
Full textSubramanian, Maheswari, and Reeba Korah. "A Framework of Secured Embedding Scheme Using Vector Discrete Wavelet Transformation and Lagrange Interpolation." Journal of Computer Networks and Communications 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/8695103.
Full textTang, Chun Ge, Tie Sheng Fan, Lei Liu, and Zhi Hui Li. "Blind Digital Image Watermarking Algorithm Based on the Chain Code." Advanced Materials Research 546-547 (July 2012): 410–15. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.410.
Full textVoyiatzis, Ioannis. "A Low-Cost BIST Scheme for Test Vector Embedding in Accumulator-Generated Sequences." VLSI Design 2008 (March 17, 2008): 1–8. http://dx.doi.org/10.1155/2008/680157.
Full textDissertations / Theses on the topic "Embedding a vector of bits"
Талмач, Дмитро Павлович. "Детерміновані методи відображення повідомлення в точку еліптичної кривої, заданої у різних формах." Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/44276.
Full textThe work is devoted to constructing deterministic polynomial algorithm for encoding sequences of bits into points of Elliptic Curves represented in different forms. The work presents basic information related to the topic of Elliptic Curves, especially in the Edwards form, that is necessary for understanding further mathematical calculations. Next, the problem of encoding underlying field elements, over which the curve is defined, into points of the curve for using this encoding in cryptographic protocols, which are based on hashing or key encapsulation schemes, is considered in more detail. In the last section new algorithms are presented and compared.
Gibert, Domingo Jaume. "Vector Space Embedding of Graphs via Statistics of Labelling Information." Doctoral thesis, Universitat Autònoma de Barcelona, 2012. http://hdl.handle.net/10803/96240.
Full textPattern recognition is the task that aims at distinguishing objects among different classes. When such a task wants to be solved in an automatic way a crucial step is how to formally represent such patterns to the computer. Based on the different representational formalisms, we may distinguish between statistical and structural pattern recognition. The former describes objects as a set of measurements arranged in the form of what is called a feature vector. The latter assumes that relations between parts of the underlying objects need to be explicitly represented and thus it uses relational structures such as graphs for encoding their inherent information. Vector spaces are a very flexible mathematical structure that has allowed to come up with several efficient ways for the analysis of patterns under the form of feature vectors. Nevertheless, such a representation cannot explicitly cope with binary relations between parts of the objects and it is restricted to measure the exact same number of features for each pattern under study regardless of their complexity. Graph-based representations present the contrary situation. They can easily adapt to the inherent complexity of the patterns but introduce a problem of high computational complexity, hindering the design of efficient tools to process and analyze patterns. Solving this paradox is the main goal of this thesis. The ideal situation for solving pattern recognition problems would be to represent the patterns using relational structures such as graphs, and to be able to use the wealthy repository of data processing tools from the statistical pattern recognition domain. An elegant solution to this problem is to transform the graph domain into a vector domain where any processing algorithm can be applied. In other words, by mapping each graph to a point in a vector space we automatically get access to the rich set of algorithms from the statistical domain to be applied in the graph domain. Such methodology is called graph embedding. In this thesis we propose to associate feature vectors to graphs in a simple and very efficient way by just putting attention on the labelling information that graphs store. In particular, we count frequencies of node labels and of edges between labels. Although their locality, these features are able to robustly represent structurally global properties of graphs, when considered together in the form of a vector. We initially deal with the case of discrete attributed graphs, where features are easy to compute. The continuous case is tackled as a natural generalization of the discrete one, where rather than counting node and edge labelling instances, we count statistics of some representatives of them. We encounter how the proposed vectorial representations of graphs suffer from high dimensionality and correlation among components and we face these problems by feature selection algorithms. We also explore how the diversity of different embedding representations can be exploited in order to boost the performance of base classifiers in a multiple classifier systems framework. An extensive experimental evaluation finally shows how the methodology we propose can be efficiently computed and compete with other graph matching and embedding methodologies.
Kim, Joo-Kyung. "Linguistic Knowledge Transfer for Enriching Vector Representations." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1500571436042414.
Full textGhazi, Kaoutar. "Heuristiques et conjectures à propos de la 2-dimension des ordres partiels." Thesis, Université Clermont Auvergne (2017-2020), 2017. http://www.theses.fr/2017CLFAC084/document.
Full textThe main question asked when manipulating partial orders (hierarchies), is how to represent them in computer. Among solutions proposed in literature, there is the bit-vector encoding. In this thesis, we consider the problem of computing a bit-vector encoding of orders with minimal size, which is also known as the problem of computing the2-dimension of orders that is NP-complete. We propose heuristics solutions of the problem for the general case and for some particular order classes. In addition, this thesis presents some results about conjectures on the 2-dimension of trees. Especially, the conjecture of Habib et al. about the 2-approximability of the 2-dimension of trees. We propose some ideas of a proof of this conjecture then give a reformulation of it that brings new perspectives on the problem that are finding efficient bits-vector encodings of orders of size less than their 2-dimension. We disprove two other conjectures
Bahceci, Oktay. "Deep Neural Networks for Context Aware Personalized Music Recommendation : A Vector of Curation." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210252.
Full textInformationsfiltrering och rekommendationssystem har använts och implementeratspå flera olika sätt från olika enheter sedan gryningen avInternet, och moderna tillvägagångssätt beror påMaskininlärrning samtDjupinlärningför att kunna skapa precisa och personliga rekommendationerför användare i en given kontext. Dessa modeller kräver data i storamängder med en varians av kännetecken såsom tid, plats och användardataför att kunna hitta korrelationer samt mönster som klassiska modellersåsom matris faktorisering samt samverkande filtrering inte kan. Dettaexamensarbete forskar, implementerar och jämför en mängd av modellermed fokus påMaskininlärning samt Djupinlärning för musikrekommendationoch gör det med succé genom att representera rekommendationsproblemetsom ett extremt multi-klass klassifikationsproblem med 100000 unika klasser att välja utav. Genom att jämföra fjorton olika experiment,så lär alla modeller sig kännetäcken såsomtid, plats, användarkänneteckenoch lyssningshistorik för att kunna skapa kontextberoendepersonaliserade musikprediktioner, och löser kallstartsproblemet genomanvändning av användares demografiska kännetäcken, där den bästa modellenklarar av att fånga målklassen i sin rekommendationslista medlängd 100 för mer än 1/3 av det osedda datat under en offline evaluering,när slumpmässigt valda exempel från den osedda kommande veckanevalueras.
Malik, Muhammad Hamza. "Information extraction and mapping for KG construction with learned concepts from scientic documents : Experimentation with relations data for development of concept learner." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-285572.
Full textSystematisk granskning av forskningsmanuskript är en vanlig procedur där forskningsstudier inom ett visst område klassificeras och struktureras på ett metodologiskt sätt. Denna process innefattar en omfattande granskning och sammanförande av vetenskapliga mätvärden och attribut för manuskriptet, såsom citat, typ av manuskript eller publiceringsplats. Framställning och kartläggning av relevant publikationsdata är uppenbarligen en mycket mödosam uppgift om den utförs manuellt. Avsikten med automatiseringen av processen för denna typ av systematisk kartläggning är att minska den mänskliga ansträngningen, och den tid som krävs kan på så sätt minskas. Syftet med denna avhandling är att automatisera datautvinning och stegen för kartläggning vid systematisk granskning av studier. Den manuella processen ersätts av avancerade grafmodelleringstekniker för effektiv kunskapsrepresentation, liksom avancerade maskininlärningstekniker som syftar till att lära maskinen dessa representationer. Detta automatiserar så småningom denna process genom att karakterisera publikationerna beserat på vissa subjektiva egenskaper och kvaliter som ger granskaren en snabb god översikt över varje forskningsstudie. Den slutliga modellen är ett inlärningskoncept som förutsäger dessa subjektiva egenskaper och dessutom behandlar den inneboende konceptuella driften i manuskriptet över tiden. Olika modeller utvecklades och undersöktes i denna forskningsstudie för utvecklingen av inlärningskonceptet. Resultaten visar att: (1) Diagrammatiskt resonerande som uttnytjar moderna grafdatabaser är mycket effektiva för att fånga den framställda kunskapen i en så kallad kunskapsgraf, och gör det möjligt att vidareutveckla koncept som kan läras med hjälp av standard tekniker för maskininlärning. (2) Neurala nätverksmodeller och ensemblemodeller överträffade andra standard maskininlärningstekniker baserat på utvärderingsvärdena. (3) Inlärningskonceptet kan detektera och undvika konceptuell drift baserat på F1-poäng och omlärning av algoritmen.
Dall'Olio, Lorenzo. "Estimation of biological vascular ageing via photoplethysmography: a comparison between statistical learning and deep learning." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amslaurea.unibo.it/21687/.
Full textLipecki, Johan, and Viggo Lundén. "The Effect of Data Quantity on Dialog System Input Classification Models." Thesis, KTH, Hälsoinformatik och logistik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-237282.
Full textDetta arbete undersöker hur olika datamängder påverkar olika slags ordvektormodeller för klassificering av indata till dialogsystem. Hypotesen att det finns ett tröskelvärde för träningsdatamängden där täta ordvektormodeller när den högsta moderna utvecklingsnivån samt att n-gram-ordvektor-klassificerare med bokstavs-noggrannhet lämpar sig särskilt väl för svenska klassificerare söks bevisas med stöd i att sammansättningar är särskilt produktiva i svenskan och att bokstavs-noggrannhet i modellerna gör att tidigare osedda ord kan klassificeras. Dessutom utvärderas hypotesen att klassificerare som tränas med enkla påståenden är bättre lämpade att klassificera indata i chattkonversationer än klassificerare som tränats med hela chattkonversationer. Resultaten stödjer ingendera hypotes utan visar istället att glesa vektormodeller presterar väldigt väl i de genomförda klassificeringstesterna. Utöver detta visar resultaten att datamängden 799 544 ord inte räcker till för att träna täta ordvektormodeller väl men att konversationer räcker gott och väl för att träna modeller för klassificering av frågor och påståenden i chattkonversationer, detta eftersom de modeller som tränats med användarindata, påstående för påstående, snarare än hela chattkonversationer, inte resulterar i bättre klassificerare för chattpåståenden.
Chen, Fu-Mei, and 陳富美. "Metadata Embedding for Vector Maps by Using Reversible Steganographic Algorithms." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/17764355267847349951.
Full text國立東華大學
企業管理學系
97
A vector map consists of a sequence of two-dimensional coordinates to represent points, lines, and polygons in a digital map. They are data widely used in economic, social and environmental decision support and planning applications and are also the fuel of many applications based on Geographic Information Systems (GIS). Nowadays, more and more vector maps have been compiled and made available for dissemination via internet. Accordingly, there is need for providing the details of the downloaded vector maps to be available on demand. Metadata which is the “data about data” are introduced to provide the details of vector maps. In this thesis, we have explored an important issue on metadata embedding for vector maps by using reversible steganographic algorithms. The basic idea of this research comes from utilizing the characteristics of steganographic technologies to develop metadata embedding methods for vector maps. Thus, the major objective of this research is to propose and compare methods of using reversible steganographic algorithms to embed metadata in vector maps and to provide a better metadata storing mechanism than current used. Experiments are implemented to evaluate the feasibility of the proposed methods. In this thesis, we have successfully explored and proposed three reversible steganographic algorithms to embed metadata in vector maps. The first algorithm, which is named as the original algorithm, is used to embed 2(n-2) bits of metadata in a vector map, where n represents the total vertices in a vector map. To the best of our knowledge, the algorithm has achieved the highest bit per vertex (BPV) in th literature of steganograhy for vector maps. The second algorithm, which is named as the extended algorithm, is improved from the original algorithm for the purpose of decreasing the distortion of stego vector maps and increasing the accuracy of recovery vector maps. The experimental results, compare with the results from the original algorithm, show that the extended algorithm has reduced 50%-60% of distortion rate in stego vector maps and improved 40%-60% of accuracy in recovery vector maps. The third algorithm, which is named as the extensive algorithm, is proposed to have better data embedding capacity. The algorithm can be used to embed 2(n-2)s bits of metadata in a vector map. The n in the third algorithm also represents the total vertices of vector maps and the s here represents the segmentation values that create sub-intervals between the intervals designed for metadata embedding. Results show that we have successfully implementing a cover vector map with 65,828 vertices by using the extensive reversible steganographic algorithm to embed and extract metadata with insignificant distortion in stego vector maps and high accuracy of recovery vector maps. Although our approaches have already delivered good results, the main limitations of the proposed algorithms are coming from map precision and machine precision errors when considering cover vector map with small amount of vertices. Since the definitive capacity limit is reached when map precision and machine precision errors occur. Thus, the first suggested future work is to use other approaches to divide intervals or even use different approaches and rules to decide intervals for increased capacity or to avoid map precision and machine precision errors. The second future work which is worth to be investigated is to survey the effects of cover vector maps’ features to the algorithms proposed in this thesis, such as the complexity, the smoothness of boundary, and the included angle between vertices of cover maps. Finally, it is also worth to survey how to apply these algorithms in online mapping systems for providing better spatial vector data services.
Guo, Ji, and 郭驥. "Algal Recognition Based on Locally Linear Embedding and Support Vector Machine." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/85622915091259655246.
Full text國立臺灣大學
環境工程學研究所
103
This article is aimed to construct an effective system to implement algae recognition by using CUDA(compute unified device architecture)-based locally linear embedding(LLE) and support vector machine (SVMs approaches). In general, the previous pattern accuracy of algae recognition system is about 90% but it was lower for the recognition of some algae with irregular shapes in the natural water samples. Continuing Yang’s year study, I wanted to achieve a higher accuracy for the identification of the irregularly shaped algae. We used the images of algae captured from charge-coupled device (CCD) and only considered the algorithmic scheme. The algorithm of algal recognition system was constructed on Matlab. Features of algae were extracted by LLE, a manifold learning method, and then algae was classified by SVM, a classifier. Although the recognition accuracy for the unidentified objects is low, the accuracy for all the other algae is satisfactory. By deleting the unidentified objects first, the recognition rates for Chlorella, unidentified separatedCyanobacteria,Monoraphidium, Pediastrum,Cylindrospermum, Staurastrum are more than 80%. The recognition rates for unidentified agglomerated Cyanobacteria, Merismopedia, Microcystis are obviously lower, but they are still higher than the rates in Yang’s research. Besides, the k coefficient of the accuracy of recognition is 0.8099, which means that our recognition system is a method with high accuracy. Thirdly, LLE based on CUDA does accelerate the calculation. According to the results, this algal recognition system rlied on CUDA-based LLE and SVMs is proved to be more efficient and less time-consuming than the traditional method. Also, LLE with SVMs is better to recognize irregularly-shaped algae than explicit feature extraction method with ANN in natural water body. This system can be improved. First, removal of unidentified objects before classification of algae helps to achieve a higher accuracy rate, probably because the corresponding points of these objects do not lie in a manifold. We may also improve accuracy by modifying the existing LLE. In addition we might be able to adjust the depth of field and visual field of microscope and CCD to obtain clear enough images of appointed algae. Also, we need to dilute the samples to avoid the overlapping of several algae. Besides, it is time-consuming to compute the features if the size of sample set of test set is very large. Hence using CUDA to accelerate the process is essential and effective.
Books on the topic "Embedding a vector of bits"
Riesen, Kaspar. Graph classification and clustering based on vector space embedding. New Jersey: World Scientific, 2010.
Find full textHrushovski, Ehud, and François Loeser. The space of stably dominated types. Princeton University Press, 2017. http://dx.doi.org/10.23943/princeton/9780691161686.003.0003.
Full textHrushovski, Ehud, and François Loeser. A closer look at the stable completion. Princeton University Press, 2017. http://dx.doi.org/10.23943/princeton/9780691161686.003.0005.
Full textBook chapters on the topic "Embedding a vector of bits"
Sherkat, Ehsan, and Evangelos E. Milios. "Vector Embedding of Wikipedia Concepts and Entities." In Natural Language Processing and Information Systems, 418–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-59569-6_50.
Full textFerrer, Miquel, Itziar Bardají, Ernest Valveny, Dimosthenis Karatzas, and Horst Bunke. "Median Graph Computation by Means of Graph Embedding into Vector Spaces." In Graph Embedding for Pattern Analysis, 45–71. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-4457-2_3.
Full textGallier, Jean. "Embedding an Affine Space in a Vector Space." In Texts in Applied Mathematics, 85–101. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-9961-0_4.
Full textGallier, Jean. "Embedding an Affine Space in a Vector Space." In Texts in Applied Mathematics, 70–86. New York, NY: Springer New York, 2001. http://dx.doi.org/10.1007/978-1-4613-0137-0_4.
Full textFuchs, Mathias, and Kaspar Riesen. "Graph Embedding in Vector Spaces Using Matching-Graphs." In Similarity Search and Applications, 352–63. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89657-7_26.
Full textLuqman, Muhammad Muzzamil, Jean-Yves Ramel, and Josep Lladós. "Multilevel Analysis of Attributed Graphs for Explicit Graph Embedding in Vector Spaces." In Graph Embedding for Pattern Analysis, 1–26. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-4457-2_1.
Full textYao, Jinkui, and Yulong Zhao. "Knowledge Graph Embedding Bi-vector Models for Symmetric Relation." In Lecture Notes in Electrical Engineering, 27–36. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-32-9698-5_4.
Full textLima, Clodoaldo A. M., André L. V. Coelho, and Fernando J. Zuben. "Embedding Support Vector Machines into Localised Mixtures of Experts." In Applications and Science in Soft Computing, 155–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-45240-9_22.
Full textAmani, Arash, Mohammad Mohammadamini, and Hadi Veisi. "Kurdish Spoken Dialect Recognition Using X-Vector Speaker Embedding." In Speech and Computer, 50–57. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87802-3_5.
Full textLudwig, Günther. "Embedding of Ensembles and Effect Sets in Topological Vector Spaces." In An Axiomatic Basis for Quantum Mechanics, 101–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/978-3-642-70029-3_4.
Full textConference papers on the topic "Embedding a vector of bits"
Zhao, Juan, and Zhitang Li. "Lossless Steganography on Orthogonal Vector for 3D H.264 with Limited Distortion Diffusion." In 10th International Conference on Software Engineering and Applications (SEAS 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110203.
Full textDing, Minjie, Weiqin Tong, Xuehai Ding, Xiaoli Zhi, Xiao Wang, and Guoqing Zhang. "Knowledge Graph Embedding by Bias Vectors." In 2019 IEEE 31st International Conference on Tools with Artificial Intelligence (ICTAI). IEEE, 2019. http://dx.doi.org/10.1109/ictai.2019.00180.
Full textZhuang, Dongye, Dongming Zhang, Jintao Li, Ke Lv, and Qi Tian. "Hamming embedding with fragile bits for image search." In 2014 IEEE International Conference on Image Processing (ICIP). IEEE, 2014. http://dx.doi.org/10.1109/icip.2014.7026157.
Full textYang, Hong, Shirui Pan, Ling Chen, Chuan Zhou, and Peng Zhang. "Low-Bit Quantization for Attributed Network Representation Learning." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/562.
Full textYang, Shihui, Jidong Tian, Honglun Zhang, Junchi Yan, Hao He, and Yaohui Jin. "TransMS: Knowledge Graph Embedding for Complex Relations by Multidirectional Semantics." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/268.
Full textAssanovich, B. A. "Embedding bits in compressed data for selective encryption and watermarking." In 2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering (SIBIRCON). IEEE, 2008. http://dx.doi.org/10.1109/sibircon.2008.4602590.
Full textMihaljevic, Miodrag J., and Hideki Imai. "A stream cipher design based on embedding of random bits." In 2008 International Symposium on Information Theory and Its Applications (ISITA). IEEE, 2008. http://dx.doi.org/10.1109/isita.2008.4895641.
Full textVandierendonck, Hans, and Koen De Bosschere. "Implicit hints: Embedding hint bits in programs without ISA changes." In 2010 IEEE International Conference on Computer Design (ICCD 2010). IEEE, 2010. http://dx.doi.org/10.1109/iccd.2010.5647699.
Full textLiao, Xin, and Qiao-yan Wen. "Embedding in Two Least Significant Bits with Wet Paper Coding." In 2008 International Conference on Computer Science and Software Engineering. IEEE, 2008. http://dx.doi.org/10.1109/csse.2008.970.
Full textGeorges, Munir, Jonathan Huang, and Tobias Bocklet. "Compact Speaker Embedding: lrx-Vector." In Interspeech 2020. ISCA: ISCA, 2020. http://dx.doi.org/10.21437/interspeech.2020-2106.
Full textReports on the topic "Embedding a vector of bits"
Antignus, Yehezkiel, Ernest Hiebert, Shlomo Cohen, and Susan Webb. Approaches for Studying the Interaction of Geminiviruses with Their Whitefly Vector Bemisia tabaci. United States Department of Agriculture, July 1995. http://dx.doi.org/10.32747/1995.7604928.bard.
Full text