Sciweavers

920 search results - page 30 / 184
» Accurate Step Counting
Sort
View
ICDE
2010
IEEE
214views Database» more  ICDE 2010»
15 years 9 months ago
Differential Privacy via Wavelet Transforms
Privacy preserving data publishing has attracted considerable research interest in recent years. Among the existing solutions, -differential privacy provides one of the strongest p...
Xiaokui Xiao, Guozhang Wang, Johannes Gehrke
ICASSP
2009
IEEE
15 years 4 months ago
An efficient and robust method for detecting copy-move forgery
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approac...
Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon
ICC
2009
IEEE
138views Communications» more  ICC 2009»
15 years 4 months ago
Measuring Indoor Mobile Wireless Link Quality
—This paper investigates methods for link quality measurement of an indoor, time-varying wireless link. Link quality estimates are used for a number of higher-layer functions, in...
Andreas Wapf, Michael R. Souryal
ICASSP
2010
IEEE
14 years 10 months ago
Matching canvas weave patterns from processing x-ray images of master paintings
Thread counting algorithms seek to determine from x-ray images the vertical and horizontal thread counts (frequencies) of the canvas weave comprising a painting’s support. Our s...
Don H. Johnson, Lucia Sun, C. Richard Johnson Jr.,...
WEA
2010
Springer
397views Algorithms» more  WEA 2010»
15 years 4 months ago
A New Combinational Logic Minimization Technique with Applications to Cryptology
Abstract. A new technique for combinational logic optimization is described. The technique is a two-step process. In the first step, the nonlinearity of a circuit – as measured ...
Joan Boyar, René Peralta