Sciweavers

361 search results - page 60 / 73
» Message Sequence Charts
Sort
View
IH
2005
Springer
14 years 1 months ago
Embedding Covert Channels into TCP/IP
It is commonly believed that steganography within TCP/IP is easily achieved by embedding data in header fields seemingly filled with “random” data, such as the IP identifier...
Steven J. Murdoch, Stephen Lewis
ECCV
2010
Springer
14 years 21 days ago
Stacked Hierarchical Labeling
In this work we propose a hierarchical approach for labeling semantic objects and regions in scenes. Our approach is reminiscent of early vision literature in that we use a decompo...
CISC
2006
Springer
106views Cryptology» more  CISC 2006»
13 years 11 months ago
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC co...
Debrup Chakraborty, Palash Sarkar
MVA
2007
103views Computer Vision» more  MVA 2007»
13 years 9 months ago
A Facial Sketch Animation Generator for Mobile Communication
The ability to analyze and reproduce specific-person facial expression is an important multimedia content service for mobile communication. In this paper, a novel three-layer faci...
Yuehu Liu, Yuanqi Su, Yang Yang, Fengjuan Wang, Ma...
JMLR
2006
125views more  JMLR 2006»
13 years 7 months ago
Spam Filtering Using Statistical Data Compression Models
Spam filtering poses a special problem in text categorization, of which the defining characteristic is that filters face an active adversary, which constantly attempts to evade fi...
Andrej Bratko, Gordon V. Cormack, Bogdan Filipic, ...