Sciweavers

758 search results - page 139 / 152
» Coding Exon Detection Using Comparative Sequences
Sort
View
AMFG
2003
IEEE
152views Biometrics» more  AMFG 2003»
14 years 4 months ago
Fully Automatic Upper Facial Action Recognition
This paper provides a new fully automatic framework to analyze facial action units, the fundamental building blocks of facial expression enumerated in Paul Ekman’s Facial Action...
Ashish Kapoor, Yuan (Alan) Qi, Rosalind W. Picard
ICIP
2004
IEEE
15 years 16 days ago
A blind cdma image watermarking scheme in wavelet domain
The paper proposes a blind spread spectrum watermarking scheme where watermark information is embedded redundantly in the multilevel wavelet coefficients of the cover image. It ha...
Santi P. Maity, Malay Kumar Kundu
ASIAMS
2009
IEEE
14 years 5 months ago
CSI Feedback Model in the Context of Adaptive Cognitive Radio Systems
Cognitive radio has the ability to sense the environment and adapt its behavior to optimize communication features, such as quality of service in the presence of interference and ...
Haleh Hosseini, Anis Izzati Ahmad Zamani, Sharifah...
IPSN
2005
Springer
14 years 4 months ago
Sensing capacity for discrete sensor network applications
We bound the number of sensors required to achieve a desired level of sensing accuracy in a discrete sensor network application (e.g. distributed detection). We model the state of...
Yaron Rachlin, Rohit Negi, Pradeep K. Khosla
KBSE
2007
IEEE
14 years 5 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr