Sciweavers

236 search results - page 31 / 48
» From Weak to Strong Watermarking
Sort
View
ICNP
2007
IEEE
14 years 4 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
JTAER
2007
90views more  JTAER 2007»
13 years 9 months ago
One-size e-business adoption model does not fit all
This empirical study of organisational e-business adoption, utilising both qualitative and quantitative data collection methods, examines four major factors influencing adoption i...
Barbara Roberts, Mark Toleman
3DIM
2011
IEEE
12 years 9 months ago
Stereo Reconstruction of Building Interiors with a Vertical Structure Prior
—Image-based computation of a 3D map for an indoor environment is a very challenging task, but also a useful step for vision-based navigation and path planning for autonomous sys...
Bernhard Zeisl, Christopher Zach, Marc Pollefeys
CVPR
2006
IEEE
14 years 12 months ago
BoostMotion: Boosting a Discriminative Similarity Function for Motion Estimation
Motion estimation for applications where appearance undergoes complex changes is challenging due to lack of an appropriate similarity function. In this paper, we propose to learn ...
Shaohua Kevin Zhou, Bogdan Georgescu, Dorin Comani...
ECAI
2008
Springer
13 years 11 months ago
Heuristics for Dynamically Adapting Propagation
Building adaptive constraint solvers is a major challenge in constraint programming. An important line of research towards this goal is concerned with ways to dynamically adapt th...
Kostas Stergiou