ABSTRACT
We introduce probabilistic (modular) embedding as an extension to the well-known notion of modular embedding [5] conceived to capture the expressiveness of stochastic systems, focussing here on tuple-based probabilistic languages.
- J. Bengt, K. G. Larsen, and W. Yi. Probabilistic extensions of process algebras. In Handbook of Process Algebra, chapter 11, pages 685--710. Elsevier, 2001.Google ScholarCross Ref
- M. Bravetti. Expressing priorities and external probabilities in process algebra via mixed open/closed systems. ENTCS, 194(2):31--57, 16 Jan. 2008. Google ScholarDigital Library
- A. Brogi, A. Di Pierro, and H. Wiklicky. Linear embedding for a quantitative comparison of language expressiveness. ENTCS, 59(3):207--237, 2002.Google Scholar
- M. Casadei, M. Viroli, and L. Gardelli. On the collective sort problem for distributed tuple spaces. Sci. Comput. Programming, 74(9):702--722, 2009. Google ScholarDigital Library
- F. S. de Boer and C. Palamidessi. Embedding as a tool for language comparison. Information and Computation, 108(1):128--157, 1994. Google ScholarDigital Library
- A. Di Pierro, C. Hankin, and H. Wiklicky. Quantitative relations and approximate process equivalences. In CONCUR 2003, volume 2761 of LNCS, pages 498--512. Springer, 2003.Google ScholarCross Ref
- A. W. Drake. Fundamentals of Applied Probability Theory. McGraw-Hill College, 1967. Google ScholarDigital Library
Recommendations
Lossless data embedding: new paradigm in digital watermarking
One common drawback of virtually all current data embedding methods is the fact that the original image is inevitably distorted due to data embedding itself. This distortion typically cannot be removed completely due to quantization, bit-replacement, or ...
Reversible Data Embedding for Tamper-Proof Watermarks
ICICIC '06: Proceedings of the First International Conference on Innovative Computing, Information and Control - Volume 3In this paper, a novel reversible data embedding for tamper-proof watermarks is proposed. A reversible watermark is embedded into robust watermark in the discrete wavelet transform (DWT) domain using a feature map and a location map. Generally, the ...
Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode
A novel self-embedding watermarking scheme for tampering recovery is proposed. Two types of modes, i.e., overlapping and overlapping-free embedding, are used. Flexible, MSB-based, interleaved reference bits are embedded for content recovery. Embedding ...
Comments