Sciweavers

2997 search results - page 419 / 600
» Fuzzy robustness analysis
Sort
View
INFOCOM
2008
IEEE
14 years 4 months ago
Towards Statistically Strong Source Anonymity for Sensor Networks
—For sensor networks deployed to monitor and report real events, event source anonymity is an attractive and critical security property, which unfortunately is also very difficu...
Min Shao, Yi Yang, Sencun Zhu, Guohong Cao
WACV
2008
IEEE
14 years 4 months ago
Tracking Down Under: Following the Satin Bowerbird
Sociobiologists collect huge volumes of video to study animal behavior (our collaborators work with 30,000 hours of video). The scale of these datasets demands the development of ...
Aniruddha Kembhavi, Ryan Farrell, Yuancheng Luo, D...
GLOBECOM
2007
IEEE
14 years 4 months ago
Developing a Group-based Security Scheme for Wireless Sensor Networks
—This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number ...
Md. Abdul Hamid, Md. Mustafizur Rahman, Young Yig ...
ICDAR
2007
IEEE
14 years 4 months ago
Simultaneous Layout Style and Logical Entity Recognition in a Heterogeneous Collection of Documents
Logical entity recognition in heterogeneous collections of document page images remains a challenging problem since the performance of traditional supervised methods degrade drama...
S. Chen, S. Mao, G. Thoma
ICDAR
2007
IEEE
14 years 4 months ago
Exploiting Fisher Kernels in Decoding Severely Noisy Document Images
Decoding noisy document images is commonly needed in applications such as enterprise content management. Available OCR solutions are still not satisfactory especially on noisy ima...
J. Chen, Y. Wang