Sciweavers

98 search results - page 6 / 20
» A note on weak dividing
Sort
View
ICPR
2006
IEEE
14 years 8 months ago
Modification of the AdaBoost-based Detector for Partially Occluded Faces
While face detection seems a solved problem under general conditions, most state-of-the-art systems degrade rapidly when faces are partially occluded by other objects. This paper ...
Jie Chen, Shiguang Shan, Shengye Yan, Xilin Chen, ...
BIRTHDAY
2000
Springer
13 years 12 months ago
Discrete time process algebra with silent step
The axiom system ACP of [10] was extended to discrete time in [6]. Here, we proceed to define the silent step in this theory in branching bisimulation semantics [7, 15] rather th...
Jos C. M. Baeten, Jan A. Bergstra, Michel A. Renie...
ICPR
2002
IEEE
14 years 8 months ago
A Robust License-Plate Extraction Method under Complex Image Conditions
A robust approach for extracting car license plate from images with complex background and relatively poor quality is presented in this paper. The approach focuses on dealing with...
Sunghoon Kim, Daechul Kim, Younbok Ryu, Gyeonghwan...
AAECC
2007
Springer
105views Algorithms» more  AAECC 2007»
14 years 1 months ago
On Non-randomness of the Permutation After RC4 Key Scheduling
Abstract. Here we study a weakness of the RC4 Key Scheduling Algorithm (KSA) that has already been noted by Mantin and Mironov. Consider the RC4 permutation S of N (usually 256) by...
Goutam Paul, Subhamoy Maitra, Rohit Srivastava
COMCOM
1998
81views more  COMCOM 1998»
13 years 7 months ago
Secure broadcasting in large networks
In this note, we show that a proposed secure broadcasting scheme is insecure. We also present a modified scheme to overcome this weakness. The modified scheme has the extra adva...
Hung-Min Sun, Shiuh-Pyng Shieh