Sciweavers

988 search results - page 78 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
GLOBECOM
2009
IEEE
14 years 7 months ago
Impact of Asymmetric Routing on Statistical Traffic Classification
Statistical traffic classification techniques are often developed under the assumption that monitoring devices can observe the two half-flows composing each traffic session. Howeve...
Manuel Crotti, Francesco Gringoli, Luca Salgarelli
TASLP
2011
14 years 4 months ago
Joint Estimation of Chords and Downbeats From an Audio Signal
—We present a new technique for joint estimation of the chord progression and the downbeats from an audio file. Musical signals are highly structured in terms of harmony and rhy...
Helene Papadopoulos, Geoffroy Peeters
ICDCS
2011
IEEE
13 years 9 months ago
Localizing Multiple Jamming Attackers in Wireless Networks
Abstract—Jamming attacks and unintentional radio interference are one of the most urgent threats harming the dependability of wireless communication and endangering the successfu...
Hongbo Liu, Zhenhua Liu, Yingying Chen, Wenyuan Xu
VIS
2004
IEEE
126views Visualization» more  VIS 2004»
15 years 11 months ago
Physically Based Methods for Tensor Field Visualization
The physical interpretation of mathematical features of tensor fields is highly application-specific. Existing visualization methods for tensor fields only cover a fraction of the...
Bernd Hamann, Boris Jeremic, Hans Hagen, Ingrid Ho...
CW
2008
IEEE
15 years 4 months ago
Keyframe Based Video Object Deformation
—This paper proposes a keyframe-based video object editing scheme for automatic object shape deformation. Except for object segmentation, several technologies are developed in th...
Yanlin Weng, Weiwei Xu, Shichao Hu, Jun Zhang, Bai...