Sciweavers

1511 search results - page 254 / 303
» Active Risk Estimation
Sort
View
IH
2007
Springer
14 years 2 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath
IPSN
2007
Springer
14 years 2 months ago
Power scheduling for wireless sensor and actuator networks
We previously presented a model for some wireless sensor and actuator network (WSAN) applications based on the vector space tools of frame theory. In this WSAN model there is a we...
Christopher J. Rozell, Don H. Johnson
LOCA
2007
Springer
14 years 2 months ago
LifeTag: WiFi-Based Continuous Location Logging for Life Pattern Analysis
Continuous logging of a person’s geographical position is required for various “life-log” applications, such as memory aids, automatic blog generation, and life pattern analy...
Jun Rekimoto, Takashi Miyaki, Takaaki Ishizawa
SAMT
2007
Springer
168views Multimedia» more  SAMT 2007»
14 years 2 months ago
Video Summarisation for Surveillance and News Domain
Video summarization approaches have various fields of application, specifically related to organizing, browsing and accessing large video databases. In this paper we propose and ev...
Uros Damnjanovic, Tomas Piatrik, Divna Djordjevic,...
SCIA
2007
Springer
162views Image Analysis» more  SCIA 2007»
14 years 2 months ago
A Robust Approach for 3D Cars Reconstruction
Computing high quality 3D models from multi-view stereo reconstruction is an active topic as can be seen in a recent review [15]. Most approaches make the strong assumption that th...
Adrien Auclair, Laurent D. Cohen, Nicole Vincent