Sciweavers

1030 search results - page 149 / 206
» Happenings
Sort
View
ISI
2008
Springer
14 years 11 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
ICCV
1998
IEEE
16 years 1 months ago
Optical Flow Estimation Using Wavelet Motion Model
A motion estimation algorithm using wavelet approximation as an optical ow model has been developed to estimate accurate dense optical ow from an image sequence. This wavelet moti...
Yu-Te Wu, Takeo Kanade, Jeffrey F. Cohn, Ching-Chu...
ECCV
2008
Springer
16 years 1 months ago
Multi-stage Contour Based Detection of Deformable Objects
We present an efficient multi stage approach to detection of deformable objects in real, cluttered images given a single or few hand drawn examples as models. The method handles de...
Saiprasad Ravishankar, Arpit Jain, Anurag Mittal
ICIP
2004
IEEE
16 years 23 days ago
Multiple-description coding for robust image watermarking
If we treated image watermarking as a communication problem using the image as the communication channel, applying error-correcting codes (ECC) to the watermarking system should i...
Ying-Fen Hsia, Chen-Yao Chang, Jay-Ray Liao
DAC
2008
ACM
16 years 4 days ago
On reliable modular testing with vulnerable test access mechanisms
In modular testing of system-on-a-chip (SoC), test access mechanisms (TAMs) are used to transport test data between the input/output pins of the SoC and the cores under test. Prio...
Lin Huang, Feng Yuan, Qiang Xu