Sciweavers

858 search results - page 100 / 172
» Lin's method
Sort
View
PERCOM
2009
ACM
14 years 3 months ago
uWave: Accelerometer-based Personalized Gesture Recognition and Its Applications
Abstract—The proliferation of accelerometers on consumer electronics has brought an opportunity for interaction based on gestures or physical manipulation of the devices. We pres...
Jiayang Liu, Zhen Wang, Lin Zhong, Jehan Wickramas...
GLOBECOM
2008
IEEE
14 years 3 months ago
Secret Key Generation and Agreement in UWB Communication Channels
—It has been shown that the radio channel impulse response for a pair of legitimate Ultra-wide band (UWB) transceivers can be used to generate secret keys for secure communicatio...
Masoud Ghoreishi Madiseh, Michael L. McGuire, Step...
ICPR
2008
IEEE
14 years 3 months ago
Layered shape matching and registration: Stochastic sampling with hierarchical graph representation
To automatically register foreground target in cluttered images, we present a novel hierarchical graph representation and a stochastic computing strategy in Bayesian framework. Th...
Xiaobai Liu, Liang Lin, Hongwei Li, Hai Jin, Wenbi...
SUTC
2008
IEEE
14 years 3 months ago
On the Security of the Full-Band Image Watermark for Copyright Protection
Digital watermarks have been embedded invisibly in digital media to protect copy rights of legal owners. The embedded watermarks can be extracted to indicate ownership originals. ...
Chu-Hsing Lin, Jung-Chun Liu, Pei-Chen Han
ICASSP
2007
IEEE
14 years 3 months ago
Block Size Forensic Analysis in Digital Images
In non-intrusive forensic analysis, we wish to find information and properties about a piece of data without any reference to the original data prior to processing. An important ...
Steven Tjoa, Wan-Yi Sabrina Lin, H. Vicky Zhao, K....