Sciweavers

384 search results - page 77 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
INFORMATICALT
2010
145views more  INFORMATICALT 2010»
13 years 6 months ago
GSM Speech Coder Indirect Identification Algorithm
This paper presents GSM speech coder indirect identification algorithm based on sending novel identification pilot signals through the GSM speech channel. Each GSM subsystem distur...
Rajko Svecko, Bojan Kotnik, Amor Chowdhury, Zdenko...
TITS
2010
189views Education» more  TITS 2010»
13 years 3 months ago
Head Pose Estimation and Augmented Reality Tracking: An Integrated System and Evaluation for Monitoring Driver Awareness
Driver distraction and inattention are prominent causes of automotive collisions. To enable driver-assistance systems to address these problems, we require new sensing approaches t...
Erik Murphy-Chutorian, Mohan M. Trivedi
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
14 years 9 months ago
Large-scale behavioral targeting
Behavioral targeting (BT) leverages historical user behavior to select the ads most relevant to users to display. The state-of-the-art of BT derives a linear Poisson regression mo...
Ye Chen, Dmitry Pavlov, John F. Canny
ICIP
1997
IEEE
14 years 10 months ago
Image Coupling, Restoration and Enhancement via PDE's
We present a new approach based on Partial Differential Equations (PDE) to restore noisy blurred images. After studying the methods to denoise images, staying as close as possible...
Pierre Kornprobst, Rachid Deriche, Gilles Aubert