Sciweavers

289 search results - page 38 / 58
» Probabilistic Combination of Multiple Evidence
Sort
View
USS
2008
13 years 10 months ago
Multi-flow Attacks Against Network Flow Watermarking Schemes
We analyze several recent schemes for watermarking network flows based on splitting the flow into intervals. We show that this approach creates time dependent correlations that en...
Negar Kiyavash, Amir Houmansadr, Nikita Borisov
MDM
2009
Springer
126views Communications» more  MDM 2009»
14 years 3 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
CIKM
2003
Springer
14 years 1 months ago
Addressing the lack of direct translation resources for cross-language retrieval
Most cross language information retrieval research concentrates on language pairs for which direct, rich, and often multiple translation resources already exist. However, for most...
Lisa Ballesteros, Mark Sanderson
ICASSP
2010
IEEE
13 years 8 months ago
Speaker identification with distant microphone speech
The field of speaker identification has recently seen significant advancement, but improvements have tended to be benchmarked on near-field speech, ignoring the more realistic set...
Qin Jin, Runxin Li, Qian Yang, Kornel Laskowski, T...
CIVR
2003
Springer
200views Image Analysis» more  CIVR 2003»
14 years 1 months ago
Multimedia Search with Pseudo-relevance Feedback
We present an algorithm for video retrieval that fuses the decisions of multiple retrieval agents in both text and image modalities. While the normalization and combination of evi...
Rong Yan, Alexander G. Hauptmann, Rong Jin