Sciweavers

5948 search results - page 356 / 1190
» Computing Robust Counter-Strategies
Sort
View
ICMCS
2006
IEEE
131views Multimedia» more  ICMCS 2006»
15 years 11 months ago
Wavelet-based Color Image Watermarking using Adaptive Entropy Casting
An adaptive robust image watermarking technique for color image authentication is proposed. In the proposed approach, the Y channel of a Yuv color host image and a concatenated RG...
Ming-Shing Hsieh, Din-Chang Tseng
112
Voted
ICRA
2006
IEEE
87views Robotics» more  ICRA 2006»
15 years 11 months ago
Motion Duplication Control for Distributed Dynamic Systems by Natural Damping
— This paper proposes a motion duplication control scheme, which not only synchronizes motions between two distributed separate dynamic systems but also perfectly preserves presc...
Joono Cheong, Seungjin Lee, Jung Kim
ICRA
2006
IEEE
223views Robotics» more  ICRA 2006»
15 years 11 months ago
Real-time 3D Model-based Tracking: Combining Edge and Texture Information
— This paper proposes a real-time, robust and efficient 3D model-based tracking algorithm. A non linear minimization approach is used to register 2D and 3D cues for monocular 3D...
Muriel Pressigout, Éric Marchand
IPOM
2005
Springer
15 years 10 months ago
On the Sensitivity of Transit ASes to Internal Failures
Abstract. Network robustness is something all providers are striving for without being able to know all the aspects it encompasses. A key aspect of network robustness concerns its ...
Steve Uhlig
DIS
2004
Springer
15 years 10 months ago
Mining Noisy Data Streams via a Discriminative Model
The two main challenges typically associated with mining data streams are concept drift and data contamination. To address these challenges, we seek learning techniques and models ...
Fang Chu, Yizhou Wang, Carlo Zaniolo