Sciweavers

5435 search results - page 79 / 1087
» Informed Detection Revisited
Sort
View
IJNSEC
2010
141views more  IJNSEC 2010»
14 years 11 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
CLEF
2011
Springer
14 years 3 months ago
The Encoplot Similarity Measure for Automatic Detection of Plagiarism - Notebook for PAN at CLEF 2011
Abstract This paper describes the evolution of our method Encoplot for automatic plagiarism detection and the results of the participation to the PAN’11
Cristian Grozea, Marius Popescu
PCM
2001
Springer
110views Multimedia» more  PCM 2001»
15 years 8 months ago
A Synchronous Fragile Watermarking Scheme for Erroneous Q-DCT Coefficients Detection
In video communications over error introducing channels, error concealment techniques are widely applied in video decoder for good subjective images output. However, a damaged MB ...
Minghua Chen, Yun He
CVPR
2006
IEEE
16 years 6 months ago
Shape-Based Approach to Robust Image Segmentation using Kernel PCA
Segmentation involves separating an object from the background. In this work, we propose a novel segmentation method combining image information with prior shape knowledge, within...
Samuel Dambreville, Yogesh Rathi, Allen Tannenbaum
HPCA
2009
IEEE
16 years 4 months ago
Criticality-based optimizations for efficient load processing
Some instructions have more impact on processor performance than others. Identification of these critical instructions can be used to modify and improve instruction processing. Pr...
Samantika Subramaniam, Anne Bracy, Hong Wang 0003,...