Sciweavers

891 search results - page 88 / 179
» Co-evolution, Determinism and Robustness
Sort
View
ICMCS
2005
IEEE
107views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Evaluating keypoint methods for content-based copyright protection of digital images
This paper evaluates the effectiveness of keypoint methods for content-based protection of digital images. These methods identify a set of “distinctive” regions (termed keypoi...
Larry Huston, Rahul Sukthankar, Yan Ke
MMSEC
2005
ACM
210views Multimedia» more  MMSEC 2005»
14 years 1 months ago
Composite signature based watermarking for fingerprint authentication
Digital watermarking is a technology to hide information in digital media. We extend the digital watermarking technique Phasemark™, originally developed solely for image authent...
Farid Ahmed, Ira S. Moskowitz
CC
2005
Springer
134views System Software» more  CC 2005»
14 years 1 months ago
Jazz: A Tool for Demand-Driven Structural Testing
Software testing to produce reliable and robust software has become vitally important in recent years. Testing is a process by which software quality can be assured through the co...
Jonathan Misurda, James A. Clause, Juliya L. Reed,...
IBPRIA
2005
Springer
14 years 1 months ago
An Algorithm for the Detection of Multiple Concentric Circles
This paper presents a method for the detection of multiple concentric circles which is based on the Hough Transform (HT). In order to reduce time and memory space the concentric ci...
Margarida Silveira
IPSN
2005
Springer
14 years 1 months ago
Ecolocation: a sequence based technique for RF localization in wireless sensor networks
Abstract— In this paper we present a novel sequence-based RF localization algorithm called Ecolocation. Our algorithm determines the location of unknown nodes by examining the or...
Kiran Yedavalli, Bhaskar Krishnamachari, Sharmila ...