Sciweavers

252 search results - page 43 / 51
» Experimenting with Server-Aided Signatures
Sort
View
MM
2010
ACM
221views Multimedia» more  MM 2010»
13 years 7 months ago
Building book inventories using smartphones
Manual generation of a book inventory is time-consuming and tedious, while deployment of barcode and radio-frequency identification (RFID) management systems is costly and afforda...
David M. Chen, Sam S. Tsai, Bernd Girod, Cheng-Hsi...
ICPR
2010
IEEE
13 years 7 months ago
Impact of Vector Ordering Strategies on Morphological Unmixing of Remotely Sensed Hyperspectral Images
Hyperspectral imaging is a new technique in remote sensing that generates hundreds of images, corresponding to different wavelength channels, for the same area on the surface of t...
Antonio Plaza, Javier Plaza
ENTCS
2007
126views more  ENTCS 2007»
13 years 7 months ago
Nominal Reasoning Techniques in Coq: (Extended Abstract)
d Abstract) Brian Aydemir Aaron Bohannon Stephanie Weirich Department of Computer and Information Science University of Pennsylvania Philadelphia, PA, USA We explore an axiomatize...
Brian E. Aydemir, Aaron Bohannon, Stephanie Weiric...
JSAC
2006
172views more  JSAC 2006»
13 years 7 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
PR
2008
239views more  PR 2008»
13 years 7 months ago
A real-time object detecting and tracking system for outdoor night surveillance
Autonomous video surveillance and monitoring has a rich history. Many deployed systems are able to reliably track human motion in indoor and controlled outdoor environments. Howev...
Kaiqi Huang, Liangsheng Wang, Tieniu Tan, Stephen ...