Sciweavers

920 search results - page 30 / 184
» Accurate Step Counting
Sort
View
ICDE
2010
IEEE
214views Database» more  ICDE 2010»
15 years 11 months ago
Differential Privacy via Wavelet Transforms
Privacy preserving data publishing has attracted considerable research interest in recent years. Among the existing solutions, -differential privacy provides one of the strongest p...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke
ICASSP
2009
IEEE
15 years 6 months ago
An efficient and robust method for detecting copy-move forgery
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approac...
Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon
ICC
2009
IEEE
138views Communications» more  ICC 2009»
15 years 6 months ago
Measuring Indoor Mobile Wireless Link Quality
—This paper investigates methods for link quality measurement of an indoor, time-varying wireless link. Link quality estimates are used for a number of higher-layer functions, in...
Andreas Wapf, Michael R. Souryal
ICASSP
2010
IEEE
14 years 12 months ago
Matching canvas weave patterns from processing x-ray images of master paintings
Thread counting algorithms seek to determine from x-ray images the vertical and horizontal thread counts (frequencies) of the canvas weave comprising a painting’s support. Our s...
Don H. Johnson, Lucia Sun, C. Richard Johnson Jr.,...
WEA
2010
Springer
397views Algorithms» more  WEA 2010»
15 years 6 months ago
A New Combinational Logic Minimization Technique with Applications to Cryptology
Abstract. A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the nonlinearity of a circuit – as measured ...
Joan Boyar, René Peralta