Sciweavers

860 search results - page 166 / 172
» Face Detection on Embedded Systems
Sort
View
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 9 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin
SAC
2008
ACM
13 years 8 months ago
Offline count-limited certificates
In this paper, we present the idea of offline count-limited certificates (or clics for short), and show how these can be implemented using minimal trusted hardware functionality a...
Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rho...
TMI
2011
182views more  TMI 2011»
13 years 3 months ago
Active Volume Models for Medical Image Segmentation
—In this paper, we propose a novel predictive model, active volume model (AVM), for object boundary extraction. It is a dynamic “object” model whose manifestation includes a ...
Tian Shen, Hongsheng Li, Xiaolei Huang
PERVASIVE
2011
Springer
12 years 11 months ago
Recognizing Whether Sensors Are on the Same Body
As personal health sensors become ubiquitous, we also expect them to become interoperable. That is, instead of closed, end-to-end personal health sensing systems, we envision stand...
Cory Cornelius, David Kotz
TMC
2012
11 years 11 months ago
Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks
—This article1 presents the design of a networked system for joint compression, rate control and error correction of video over resource-constrained embedded devices based on the...
Scott Pudlewski, Arvind Prasanna, Tommaso Melodia