Sciweavers

667 search results - page 63 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
ICDAR
2009
IEEE
15 years 6 months ago
Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds
The partial copy is a kind of copy produced by cropping parts of original materials. Illegal users often use this technique for plagiarizing copyrighted materials. In addition, or...
Weihan Sun, Koichi Kise
TIP
2008
99views more  TIP 2008»
14 years 11 months ago
Using Spanning Graphs for Efficient Image Registration
We provide a detailed analysis of the use of minimal spanning graphs as an alignment method for registering multimodal images. This yields an efficient graph theoretic algorithm th...
Mert R. Sabuncu, Peter J. Ramadge
ISMIR
2005
Springer
145views Music» more  ISMIR 2005»
15 years 5 months ago
Classification of Musical Metre with Autocorrelation and Discriminant Functions
The performance of autocorrelation-based metre induction was tested with two large collections of folk melodies, consisting of approximately 13,000 melodies in MIDI file format, f...
Petri Toiviainen, Tuomas Eerola
CCS
2009
ACM
15 years 6 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
15 years 5 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...