Sciweavers

7544 search results - page 76 / 1509
» Network Forensics Analysis
Sort
View
LCN
2008
IEEE
15 years 4 months ago
Real-time performance analysis of Adaptive Link Rate
—High speed links are widely deployed in modern day computer networks to meet the ever growing needs for increasing data bandwidth. However, with the increase in the link rate, t...
Baoke Zhang, Karthik Sabhanatarajan, Ann Gordon-Ro...
ICCV
1999
IEEE
15 years 11 months ago
Single View Metrology
We describe how 3D affine measurements may be computed from a single perspective view of a scene given only minimal geometric information determined from the image. This minimal i...
Antonio Criminisi, Ian D. Reid, Andrew Zisserman
CHI
2008
ACM
15 years 10 months ago
DRAGON: a direct manipulation interface for frame-accurate in-scene video navigation
We present DRAGON, a direct manipulation interaction technique for frame-accurate navigation in video scenes. This technique benefits tasks such as professional and amateur video ...
Thorsten Karrer, Malte Weiss, Eric Lee, Jan Borche...
IWDW
2007
Springer
15 years 4 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
ICASSP
2010
IEEE
14 years 10 months ago
Hiding information inside structured shapes
This paper describes a new technique for embedding a message within structured shapes. It is desired that my changes in the shape owing to the embedded message are invisible to a ...
Samarjit Das, Shantanu Rane, Anthony Vetro