Sciweavers

3169 search results - page 209 / 634
» Robust Timed Automata
Sort
View
113
Voted
ICIP
2004
IEEE
16 years 5 months ago
A framework for soft hashing and its application to robust image hashing
An increasing interest in the soft hashing problem has been witnessed in recent times. Techniques implementing soft hashing intend to mirror the behaviour of cryptographic hashing...
Elizabeth P. McCarthy, Félix Balado, Guenol...
134
Voted
ICPR
2002
IEEE
16 years 4 months ago
Interacting Multiple Model (IMM) Kalman Filters for Robust High Speed Human Motion Tracking
Accurate and robust tracking of humans is of growing interest in the image processing and computer vision communities. The ability of a vision system to track the subjects and acc...
Michael E. Farmer, Rein-Lien Hsu, Anil K. Jain
124
Voted
ICASSP
2009
IEEE
15 years 10 months ago
An efficient and robust method for detecting copy-move forgery
Copy-move forgery is a specific type of image tampering, where a part of the image is copied and pasted on another part of the same image. In this paper, we propose a new approac...
Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon
150
Voted
CVPR
2008
IEEE
15 years 10 months ago
A Loopy Belief Propagation approach for robust background estimation
Background estimation, i.e. automatic recovery of the background image from a sequence of images containing moving foreground objects, is an important module in many applications,...
Xun Xu, Thomas S. Huang
128
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Robust Optimization for Selecting NetFlow Points of Measurement in an IP Network
— NetFlow is a solution to make an in-depth traffic analysis possible in IP networks. Most of the telecommunication operators have already deployed it, or intend to do so, for n...
Mustapha Bouhtou, Olivier Klopfenstein