Sciweavers

5948 search results - page 1059 / 1190
» Computing Robust Counter-Strategies
Sort
View
125
Voted
CGF
2008
126views more  CGF 2008»
15 years 3 months ago
Part-type Segmentation of Articulated Voxel-Shapes using the Junction Rule
We present a part-type segmentation method for articulated voxel-shapes based on curve skeletons. Shapes are considered to consist of several simpler, intersecting shapes. Our met...
Dennie Reniers, Alexandru Telea
COMCOM
2008
138views more  COMCOM 2008»
15 years 3 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 3 months ago
Wide spread spectrum watermarking with side information and interference cancellation
Nowadays, a popular method used for additive watermarking is wide spread spectrum. It consists in adding a spread signal into the host document. This signal is obtained by the sum...
Gaëtan Le Guelvouit, Stéphane Pateux
139
Voted
CSDA
2008
115views more  CSDA 2008»
15 years 3 months ago
Complex-valued ICA based on a pair of generalized covariance matrices
It is shown that any pair of scatter and spatial scatter matrices yields an estimator of the separating matrix for complex-valued independent component analysis (ICA). Scatter (re...
Esa Ollila, Hannu Oja, Visa Koivunen
EAAI
2010
91views more  EAAI 2010»
15 years 3 months ago
A framework for on-line trend extraction and fault diagnosis
: Qualitative trend analysis (QTA) is a process-history-based data-driven technique that works by extracting important features (trends) from the measured signals and evaluating th...
Mano Ram Maurya, Praveen K. Paritosh, Raghunathan ...
« Prev « First page 1059 / 1190 Last » Next »