Sciweavers

1805 search results - page 255 / 361
» Computationally Efficient Face Detection
Sort
View
ISCAS
2005
IEEE
197views Hardware» more  ISCAS 2005»
15 years 9 months ago
Averaging attack resilient video fingerprinting
— This paper addresses an effective technique for digital fingerprinting for video. While orthogonal modulation technique is a straightforward and widely used method for digital ...
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-...
AINA
2010
IEEE
15 years 8 months ago
The Cost Effective Pre-processing Based NFA Pattern Matching Architecture for NIDS
—Network Intrusion Detection System (NIDS) is a system which can detect network attacks resulted from worms and viruses on the Internet. An efficient pattern matching algorithm p...
Yeim-Kuan Chang, Chen-Rong Chang, Cheng-Chien Su
CAV
2004
Springer
108views Hardware» more  CAV 2004»
15 years 7 months ago
Functional Dependency for Verification Reduction
Abstract. The existence of functional dependency among the state variables of a state transition system was identified as a common cause of inefficient BDD representation in formal...
Jie-Hong Roland Jiang, Robert K. Brayton
ICSAP
2010
15 years 5 months ago
Tamper Proofing 3D Models
- This paper describes a novel algorithm designed for tamper proofing of 3D models. Fragile watermarking is a known technique for detecting location of tamper in the artwork. Howev...
Mukesh C. Motwani, Balaji Sridharan, Rakhi C. Motw...
129
Voted
JCIT
2008
172views more  JCIT 2008»
15 years 3 months ago
Rough Wavelet Hybrid Image Classification Scheme
This paper introduces a new computer-aided classification system for detection of prostate cancer in Transrectal Ultrasound images (TRUS). To increase the efficiency of the comput...
Hala S. Own, Aboul Ella Hassanien