Sciweavers

236 search results - page 36 / 48
» From Weak to Strong Watermarking
Sort
View
JCSS
2006
102views more  JCSS 2006»
13 years 9 months ago
Password-based authentication and key distribution protocols with perfect forward secrecy
In an open networking environment, a workstation usually needs to identify its legal users for providing its services. Kerberos provides an efficient approach whereby a trusted th...
Hung-Min Sun, Her-Tyan Yeh
ISR
2010
13 years 4 months ago
Use of Pricing Schemes for Differentiating Information Goods
Information goods vendors offer different pricing schemes such as per user pricing and site licensing. Why do competing sellers adopt different pricing schemes for the same inform...
Vidyanand Choudhary
TWC
2010
13 years 4 months ago
Interference-limited opportunistic relaying with reactive sensing
This work evaluates opportunistic relaying in the presence of thermal noise as well as interference, when channel sensing is conducted reactively, in slow fading environments. The ...
Aggelos Bletsas, Antonis G. Dimitriou, John N. Sah...
ICCV
2005
IEEE
14 years 11 months ago
Probabilistic Boosting-Tree: Learning Discriminative Models for Classification, Recognition, and Clustering
In this paper, a new learning framework?probabilistic boosting-tree (PBT), is proposed for learning two-class and multi-class discriminative models. In the learning stage, the pro...
Zhuowen Tu
ICIP
2003
IEEE
14 years 11 months ago
Boosting linear discriminant analysis for face recognition
In this paper, we propose a new algorithm to boost performance of traditional Linear Discriminant Analysis (LDA)-based face recognition (FR) methods in complex FR tasks, where hig...
Juwei Lu, Konstantinos N. Plataniotis, Anastasios ...