Sciweavers

970 search results - page 189 / 194
» Adaptive Analysis of On-line Algorithms
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 2 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
SAC
2006
ACM
14 years 2 months ago
BioChain: lexical chaining methods for biomedical text summarization
Lexical chaining is a technique for identifying semanticallyrelated terms in text. We propose concept chaining to link semantically-related concepts within biomedical text togethe...
Lawrence H. Reeve, Hyoil Han, Ari D. Brooks
CAIP
2005
Springer
212views Image Analysis» more  CAIP 2005»
14 years 2 months ago
3D Modeling of Humans with Skeletons from Uncalibrated Wide Baseline Views
In order to achieve precise, accurate and reliable tracking of human movement, a 3D human model that is very similar to the subject is essential. In this paper, we present a new sy...
Chee Kwang Quah, André Gagalowicz, Richard ...
IPSN
2004
Springer
14 years 1 months ago
Loss inference in wireless sensor networks based on data aggregation
In this paper, we consider the problem of inferring per node loss rates from passive end-to-end measurements in wireless sensor networks. Specifically, we consider the case of in...
Gregory Hartl, Baochun Li
MSWIM
2009
ACM
14 years 1 months ago
Modeling and performance evaluation of transmission control protocol over cognitive radio ad hoc networks
Cognitive Radio (CR) technology constitutes a new paradigm to provide additional spectrum utilization opportunities in wireless ad hoc networks. Recent research in this field has ...
Marco Di Felice, Kaushik Roy Chowdhury, Luciano Bo...