Sciweavers

520 search results - page 39 / 104
» Computing recombination networks from binary sequences
Sort
View
ICIAP
2003
ACM
15 years 3 months ago
Detection and recognition of moving objects using statistical motion detection and Fourier descriptors
Object recognition, i. e. classification of objects into one of several known object classes, generally is a difficult task. In this paper we address the problem of detecting an...
Daniel Toth, Til Aach
MOBIHOC
2006
ACM
15 years 9 months ago
Adaptive splitting protocols for RFID tag collision arbitration
Tag identification is an important tool in RFID systems with applications for monitoring and tracking. A RFID reader recognizes tags through communication over a shared wireless c...
Jihoon Myung, Wonjun Lee
CCS
2003
ACM
15 years 3 months ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
ICDCSW
2003
IEEE
15 years 3 months ago
Convergence of IPsec in Presence of Resets
IPsec is the current security standard for the Internet Protocol IP. According to this standard, a selected computer pair (p, q) in the Internet can be designated a “security ass...
Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy
CSIE
2009
IEEE
15 years 4 months ago
An Improved Algorithm of Digital Watermarking Based on Wavelet Transform
In this paper, a digital image watermarking technique based on Discrete Wavelet Transform (DWT) will be proposed. This scheme is designed utilizing principles deriving from the hu...
Jianhong Sun, Junsheng Li, Zhiyong Li