Sciweavers

796 search results - page 43 / 160
» Spoofing prevention method
Sort
View
ICDAR
2003
IEEE
14 years 3 months ago
New Approach for the Skeletonization of Handwritten Characters in Gray-Level Images
Existing skeletonization methods operate directly on the binary image ignoring the gray-level information. In this paper we propose a new method for the skeletonization of handwri...
Amer Dawoud, Mohamed Kamel
OOPSLA
1992
Springer
14 years 2 months ago
CACL: Efficient Fine-Grained Protection for Objects
CACL is a protection scheme for objects that offers a simple and flexible model of protection and has an efficient, software-only implementation. The model, based on Access Contro...
Joel E. Richardson, Peter M. Schwarz, Luis-Felipe ...
CVPR
2010
IEEE
14 years 1 months ago
Hybrid Shift Map for Video Retargeting
We propose a new method for video retargeting, which can generate spatial-temporal consistent video. The new measure called spatial-temporal naturality preserves the motion in the ...
Yiqun Hu and Deepu Rajan
AAAI
2008
14 years 7 days ago
Minimizing the Spread of Contamination by Blocking Links in a Network
We address the problem of minimizing the propagation of undesirable things, such as computer viruses or malicious rumors, by blocking a limited number of links in a network, a dua...
Masahiro Kimura, Kazumi Saito, Hiroshi Motoda
IJNSEC
2007
154views more  IJNSEC 2007»
13 years 9 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski