Sciweavers

244 search results - page 4 / 49
» Evaluation of Robust Fitting Based Detection
Sort
View
ICMCS
2009
IEEE
111views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Robust copy detection by mining temporal self-similarities
This paper introduces a Self-Similarity Matrix (SSM) based video copy detection scheme and a Visual Character-String (VCS) descriptor for SSM matching. SSM, which exploits the spa...
Zhipeng Wu, Qingming Huang, Shuqiang Jiang
WWIC
2010
Springer
278views Communications» more  WWIC 2010»
13 years 11 months ago
Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
Abstract. In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting physical layer jamming attacks in wireless networks, by seeking changes i...
Alexandros G. Fragkiadakis, Vasilios A. Siris, Nik...
ITCC
2002
IEEE
14 years 11 days ago
Audio Watermarking Quality Evaluation: Robustness to DA/AD Processes
Audio watermarking has become an important technology for recording and advertisement industry. Today’s embedding and detection strategies often rely on digital or at least high...
Martin Steinebach, Andreas Lang, Jana Dittmann, Ch...
ACMICEC
2005
ACM
157views ECommerce» more  ACMICEC 2005»
13 years 9 months ago
The development and evaluation of exception handling mechanisms for order fulfillment process based on BPEL4WS
The advance of Internet technology fosters the order fulfillment process in a supply chain across heterogeneous information systems. In order to monitor states between partners in...
Fu-ren Lin, Hsiang-chin Chang
IOLTS
2002
IEEE
127views Hardware» more  IOLTS 2002»
14 years 11 days ago
Fault Tolerance Evaluation Using Two Software Based Fault Injection Methods
A silicon independent C-Based model of the TTP/C protocol was implemented within the EU-founded project FIT. The C-based model is integrated in the C-Sim simulation environment. T...
Astrit Ademaj, Petr Grillinger, Pavel Herout, Jan ...