Sciweavers

796 search results - page 48 / 160
» Spoofing prevention method
Sort
View
INFOCOM
2011
IEEE
13 years 1 months ago
Maintaining source privacy under eavesdropping and node compromise attacks
—In a sensor network, an important problem is to provide privacy to the event detecting sensor node and integrity to the data gathered by the node. Compromised source privacy can...
Kanthakumar Pongaliur, Li Xiao
ICASSP
2007
IEEE
14 years 4 months ago
Breaking the Limitation of Manifold Analysis for Super-Resolution of Facial Images
A novel method for robust super-resolution offace images is proposed in this paper. Face super-resolution is a particular interest in video surveillance where face images have typ...
Sung Won Park, Marios Savvides
IJCNLP
2005
Springer
14 years 3 months ago
Acquiring Synonyms from Monolingual Comparable Texts
This paper presents a method for acquiring synonyms from monolingual comparable text (MCT). MCT denotes a set of monolingual texts whose contents are similar and can be obtained au...
Mitsuo Shimohata, Eiichiro Sumita
CVPR
2006
IEEE
14 years 12 months ago
Efficient Optimal Kernel Placement for Reliable Visual Tracking
This paper describes a novel approach to optimal kernel placement in kernel-based tracking. If kernels are placed at arbitrary places, kernel-based methods are likely to be trappe...
Zhimin Fan, Ming Yang, Ying Wu, Gang Hua, Ting Yu
MICCAI
2003
Springer
14 years 10 months ago
Geostatistical Medical Image Registration
Abstract. We propose a novel approach to landmark-based medical image registration based on the geostatical method of Kriging prediction. Our method exploits the spatial statistica...
Carl-Fredrik Westin, Carlos Alberola-López,...