Sciweavers

2421 search results - page 59 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
143
Voted
SACMAT
2009
ACM
15 years 7 months ago
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whethe...
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
91
Voted
ICASSP
2010
IEEE
15 years 23 days ago
Wideband noise suppression supported by artificial bandwidth extension techniques
This contribution presents a wideband (50 Hz – 7 kHz) speech enhancement system that is operating in the frequency domain. As a novel feature, techniques known from artificial ...
Thomas Esch, Florian Heese, Bernd Geiser, Peter Va...
108
Voted
EMMCVPR
2005
Springer
15 years 6 months ago
Extraction of Layers of Similar Motion Through Combinatorial Techniques
In this paper we present a new technique to extract layers in a video sequence. To this end, we assume that the observed scene is composed of several transparent layers, that their...
Romain Dupont, Nikos Paragios, Renaud Keriven, Phi...
77
Voted
ICCSA
2005
Springer
15 years 6 months ago
A Novel Delaunay Simplex Technique for Detection of Crystalline Nuclei in Dense Packings of Spheres
The paper presents a new approach for revealing regions (nuclei) of crystalline structures in computer models of dense packings of spherical atoms using the Voronoi-Delaunay method...
Alexey V. Anikeenko, Marina L. Gavrilova, Nikolai ...
ICIP
2005
IEEE
16 years 2 months ago
Semifragile hierarchical watermarking in a set theoretic framework
We introduce a set theoretic framework for watermarking and illustrate its effectiveness by designing a hierarchical semi-fragile watermark that is tolerant to compression and all...
Oktay Altun, Gaurav Sharma, Mehmet Utku Celik, Mar...