Sciweavers

6137 search results - page 1011 / 1228
» Securing Collaborative Applications
Sort
View
TIP
2011
195views more  TIP 2011»
13 years 5 months ago
Accelerating X-Ray Data Collection Using Pyramid Beam Ray Casting Geometries
Abstract—Image reconstruction from its projections is a necessity in many applications such as medical (CT), security, inspection, and others. This paper extends the 2-D Fan-beam...
Amir Averbuch, Guy Lifschitz, Yoel Shkolnisky
IJNSEC
2010
98views more  IJNSEC 2010»
13 years 5 months ago
A Random Bit Generator Using Chaotic Maps
Chaotic systems have many interesting features such as sensitivity on initial condition and system parameter, ergodicity and mixing properties. In this paper, we exploit these int...
Narendra K. Pareek, Vinod Patidar, Krishan K. Sud
JMLR
2010
198views more  JMLR 2010»
13 years 5 months ago
Online Anomaly Detection under Adversarial Impact
Security analysis of learning algorithms is gaining increasing importance, especially since they have become target of deliberate obstruction in certain applications. Some securit...
Marius Kloft, Pavel Laskov
CORR
2011
Springer
180views Education» more  CORR 2011»
13 years 4 months ago
A Formalization of Polytime Functions
Abstract. We present a deep embedding of Bellantoni and Cook’s syntactic characterization of polytime functions. We prove formally that it is correct and complete with respect to...
Sylvain Heraud, David Nowak
ICASSP
2011
IEEE
13 years 1 months ago
Human gait parameter estimation based on micro-doppler signatures using particle filters
Monitoring and tracking human activities around restricted areas is an important issue in security and surveillance applications. The movement of different parts of the human body...
M. B. Guldogan, Fredrik Gustafsson, Umut Orguner, ...
« Prev « First page 1011 / 1228 Last » Next »