Sciweavers

970 search results - page 189 / 194
» Adaptive Analysis of On-line Algorithms
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
15 years 11 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
SAC
2006
ACM
15 years 11 months ago
BioChain: lexical chaining methods for biomedical text summarization
Lexical chaining is a technique for identifying semanticallyrelated terms in text. We propose concept chaining to link semantically-related concepts within biomedical text togethe...
Lawrence H. Reeve, Hyoil Han, Ari D. Brooks
CAIP
2005
Springer
212views Image Analysis» more  CAIP 2005»
15 years 11 months ago
3D Modeling of Humans with Skeletons from Uncalibrated Wide Baseline Views
In order to achieve precise, accurate and reliable tracking of human movement, a 3D human model that is very similar to the subject is essential. In this paper, we present a new sy...
Chee Kwang Quah, André Gagalowicz, Richard ...
131
Voted
IPSN
2004
Springer
15 years 10 months ago
Loss inference in wireless sensor networks based on data aggregation
In this paper, we consider the problem of inferring per node loss rates from passive end-to-end measurements in wireless sensor networks. Specifically, we consider the case of in...
Gregory Hartl, Baochun Li
MSWIM
2009
ACM
15 years 10 months ago
Modeling and performance evaluation of transmission control protocol over cognitive radio ad hoc networks
Cognitive Radio (CR) technology constitutes a new paradigm to provide additional spectrum utilization opportunities in wireless ad hoc networks. Recent research in this field has ...
Marco Di Felice, Kaushik Roy Chowdhury, Luciano Bo...