Sciweavers

2929 search results - page 166 / 586
» Robust Hand Detection
Sort
View
DATE
2010
IEEE
188views Hardware» more  DATE 2010»
15 years 9 months ago
Power-accuracy tradeoffs in human activity transition detection
— Wearable, mobile computing platforms are envisioned to be used in out-patient monitoring and care. These systems continuously perform signal filtering, transformations, and cla...
Jeffrey Boyd, Hari Sundaram, Aviral Shrivastava
142
Voted
IAAI
2003
15 years 5 months ago
Searching for Hidden Messages: Automatic Detection of Steganography
Steganography is the field of hiding messages in apparently innocuous media (e.g. images), and steganalysis is the field of detecting these covert messages. Almost all steganalysi...
George Berg, Ian Davidson, Ming-Yuan Duan, Goutam ...
SAC
2008
ACM
15 years 4 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
DAS
2010
Springer
15 years 2 months ago
Page frame detection for double page document images
Scanning two book pages at the same time helps to accelerate the scanning process but on the other hand introduces several difficulties if the user needs to have one page per imag...
Nikolaos Stamatopoulos, Basilios Gatos, Thodoris G...
135
Voted
ICIP
2006
IEEE
16 years 6 months ago
Selfish Colluder Detection and Identification in Traitors within Traitors
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same r...
H. Vicky Zhao, K. J. Ray Liu