Sciweavers

551 search results - page 110 / 111
» Preventing existence
Sort
View
TSMC
2010
13 years 2 months ago
Geometric Distortion Insensitive Image Watermarking in Affine Covariant Regions
Feature-based image watermarking schemes, which aim to survive various geometric distortions, have attracted great attention in recent years. Existing schemes have shown robustness...
Xinbo Gao, Cheng Deng, Xuelong Li, Dacheng Tao
ICASSP
2011
IEEE
12 years 11 months ago
A game theoretic approach to eavesdropper cooperation in MISO wireless networks
Information theoretic security, also called secrecy analysis, provides theoretical limit for secret data transmission even in wireless networking environment, and it is more focus...
Joohyun Peter Cho, Yao-Win Peter Hong, C. C. Jay K...
BMCBI
2011
12 years 11 months ago
Computable visually observed phenotype ontological framework for plants
Background: The ability to search for and precisely compare similar phenotypic appearances within and across species has vast potential in plant science and genetic research. The ...
Jaturon Harnsomburana, Jason M. Green, Adrian S. B...
HYBRID
2011
Springer
12 years 7 months ago
Reputation-based networked control with data-corrupting channels
We examine the problem of reliable networked control when the communication channel between the controller and the actuator periodically drops packets and is faulty i.e., corrupts...
Shreyas Sundaram, Jian Chang, Krishna K. Venkatasu...
CVPR
2012
IEEE
11 years 9 months ago
Large-scale knowledge transfer for object localization in ImageNet
ImageNet is a large-scale database of object classes with millions of images. Unfortunately only a small fraction of them is manually annotated with bounding-boxes. This prevents ...
Matthieu Guillaumin, Vittorio Ferrari