Sciweavers

2421 search results - page 59 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
174
Voted
SACMAT
2009
ACM
15 years 10 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
ICASSP
2010
IEEE
15 years 3 months ago
Wideband noise suppression supported by artificial bandwidth extension techniques
This contribution presents a wideband (50 Hz – 7 kHz) speech enhancement system that is operating in the frequency domain. As a novel feature, techniques known from artificial ...
Thomas Esch, Florian Heese, Bernd Geiser, Peter Va...
EMMCVPR
2005
Springer
15 years 9 months ago
Extraction of Layers of Similar Motion Through Combinatorial Techniques
In this paper we present a new technique to extract layers in a video sequence. To this end, we assume that the observed scene is composed of several transparent layers, that their...
Romain Dupont, Nikos Paragios, Renaud Keriven, Phi...
ICCSA
2005
Springer
15 years 9 months ago
A Novel Delaunay Simplex Technique for Detection of Crystalline Nuclei in Dense Packings of Spheres
The paper presents a new approach for revealing regions (nuclei) of crystalline structures in computer models of dense packings of spherical atoms using the Voronoi-Delaunay method...
Alexey V. Anikeenko, Marina L. Gavrilova, Nikolai ...
126
Voted
ICIP
2005
IEEE
16 years 5 months ago
Semifragile hierarchical watermarking in a set theoretic framework
We introduce a set theoretic framework for watermarking and illustrate its effectiveness by designing a hierarchical semi-fragile watermark that is tolerant to compression and all...
Oktay Altun, Gaurav Sharma, Mehmet Utku Celik, Mar...