Sciweavers

4466 search results - page 532 / 894
» Large-Scale Data Analysis Using Heuristic Methods
Sort
View
ICASSP
2009
IEEE
15 years 11 months ago
Risk-distortion analysis for video collusion attack
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
164
Voted
DAGM
2005
Springer
15 years 10 months ago
Cluster-Based Point Cloud Analysis for Rapid Scene Interpretation
A histogram-based method for the interpretation of three-dimensional (3D) point clouds is introduced, where point clouds represent the surface of a scene of multiple objects and ba...
Eric Wahl, Gerd Hirzinger
HUC
2005
Springer
15 years 10 months ago
Analysis of Chewing Sounds for Dietary Monitoring
The paper reports the results of the first stage of our work on an automatic dietary monitoring system. The work is part of a large European project on using ubiquitous systems to...
Oliver Amft, Mathias Stäger, Paul Lukowicz, G...
INFOCOM
1995
IEEE
15 years 8 months ago
Analysis of One-Way Reservation Algorithms
Modern high speed networks and ATM networks in particular use resource reservation as a basic means of establishing communications. One-way on-the- y reservation is a method for...
Israel Cidon, Raphael Rom, Yuval Shavitt
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 4 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti