Sciweavers

120 search results - page 18 / 24
» A new vectorization-based approach to the skeletonization of...
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
Foreign Code Detection on the Windows/X86 Platform
As new attacks against Windows-based machines emerge almost on a daily basis, there is an increasing need to “lock down” individual users’ desktop machines in corporate comp...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
ICIP
2010
IEEE
13 years 5 months ago
Passive imaging exploiting multiple scattering using distributed apertures
We develop a new passive image formation method capable of exploiting information about multiple scattering in the environment using measurements from a sparse array of receivers ...
Ling Wang, Il-Young Son, Birsen Yazici
ICMCS
2005
IEEE
184views Multimedia» more  ICMCS 2005»
14 years 29 days ago
Fuzzy relevance feedback in content-based image retrieval systems using radial basis function network
This paper presents a new framework called fuzzy relevance feedback in interactive content-based image retrieval (CBIR) systems based on soft-decision. An efficient learning appro...
Kim-Hui Yap, Kui Wu
BMCBI
2010
268views more  BMCBI 2010»
13 years 7 months ago
A high-level 3D visualization API for Java and ImageJ
Background: Current imaging methods such as Magnetic Resonance Imaging (MRI), Confocal microscopy, Electron Microscopy (EM) or Selective Plane Illumination Microscopy (SPIM) yield...
Benjamin Schmid, Johannes E. Schindelin, Albert Ca...
IWDW
2005
Springer
14 years 26 days ago
The Return of the Sensitivity Attack
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum ...
Pedro Comesaña, Luis Pérez-Freire, F...