Sciweavers

54 search results - page 11 / 11
» The Hidden Permutation Model and Location-Based Activity Rec...
Sort
View
TASLP
2010
138views more  TASLP 2010»
13 years 1 days ago
Glimpsing IVA: A Framework for Overcomplete/Complete/Undercomplete Convolutive Source Separation
Abstract--Independent vector analysis (IVA) is a method for separating convolutedly mixed signals that significantly reduces the occurrence of the well-known permutation problem in...
Alireza Masnadi-Shirazi, Wenyi Zhang, Bhaskar D. R...
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 5 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
PCM
2001
Springer
150views Multimedia» more  PCM 2001»
13 years 9 months ago
Unsupervised Analysis of Human Gestures
Recognition of human gestures is important for analysis and indexing of video. To recognize human gestures on video, generally a large number of training examples for each individu...
Tianshu Wang, Heung-Yeung Shum, Ying-Qing Xu, Nann...
IDEAL
2010
Springer
13 years 3 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...