Sciweavers

667 search results - page 45 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
119
Voted
ICASSP
2011
IEEE
14 years 6 months ago
Analysis of human footsteps utilizing multi-axial seismic fusion
This paper introduces a method of enhancing an unattended ground sensor (UGS) system’s classification capability of humans via seismic signatures while subsequently discriminati...
Sean Schumer
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 2 months ago
Wide spread spectrum watermarking with side information and interference cancellation
Nowadays, a popular method used for additive watermarking is wide spread spectrum. It consists in adding a spread signal into the host document. This signal is obtained by the sum...
Gaëtan Le Guelvouit, Stéphane Pateux
117
Voted
NIPS
2008
15 years 4 months ago
Sparse probabilistic projections
We present a generative model for performing sparse probabilistic projections, which includes sparse principal component analysis and sparse canonical correlation analysis as spec...
Cédric Archambeau, Francis Bach
127
Voted
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 7 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
223
Voted
ICDE
2009
IEEE
180views Database» more  ICDE 2009»
16 years 4 months ago
Outsourcing Search Services on Private Spatial Data
Social networking and content sharing service providers, e.g., Facebook and Google Maps, enable their users to upload and share a variety of user-generated content, including locat...
Man Lung Yiu, Gabriel Ghinita, Christian S. Jensen...