Sciweavers

272 search results - page 43 / 55
» Detecting Altered Fingerprints
Sort
View
ICIP
2005
IEEE
16 years 1 months ago
Watermarking JBIG2 text region for image authentication
An authentication watermarking technique (AWT) inserts hidden data into an image in order to detect any accidental or malicious alteration to the image. AWT usually computes, usin...
Sergio Vicente Denser Pamboukian, Hae Yong Kim, Ri...
ICPR
2006
IEEE
16 years 24 days ago
Automatic Alignment of High-Resolution NMR Spectra Using a Bayesian Estimation Approach
Nuclear magnetic resonance (NMR) spectral analysis has recently become one of the major means for the detection and recognition of metabolic changes of disease state, physiologica...
Seoung Bum Kim, Zhou Wang
ISBRA
2009
Springer
15 years 6 months ago
A Linear-Time Algorithm for Analyzing Array CGH Data Using Log Ratio Triangulation
Abstract. DNA copy number is the number of replicates of a contiguous segment of DNA on the genome. Copy number alteration (CNA) is a genetic abnormality in which the number of the...
Matthew Hayes, Jing Li
DSN
2008
IEEE
15 years 6 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
ICRA
2008
IEEE
210views Robotics» more  ICRA 2008»
15 years 6 months ago
Toward designing a robot that learns actions from parental demonstrations
— How to teach actions to a robot as well as how a robot learns actions is an important issue to be discussed in designing robot learning systems. Inspired by human parentinfant ...
Yukie Nagai, Claudia Muhl, Katharina J. Rohlfing