Sciweavers

796 search results - page 63 / 160
» Spoofing prevention method
Sort
View
ICRA
2003
IEEE
147views Robotics» more  ICRA 2003»
14 years 3 months ago
Controlling a marionette with human motion capture data
In this paper, we present a method for controlling a motorized, string-drivenmarionette using motion capture data from human actors. The motion data must be adapted for the marion...
Katsu Yamane, Jessica K. Hodgins, H. Benjamin Brow...
ISCAS
2003
IEEE
185views Hardware» more  ISCAS 2003»
14 years 3 months ago
A semi-fragile object based video authentication system
This paper presents a semi-fragile object-based authentication solution for MPEG4 video. To protect the integrity of the video objects / sequences, a content-based watermark is em...
Dajun He, Qibin Sun, Qi Tian
IWIA
2003
IEEE
14 years 3 months ago
Intrusion Detection Testing and Benchmarking Methodologies
— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
SRDS
2003
IEEE
14 years 3 months ago
Buffer Management in Probabilistic Peer-to-Peer Communication Protocols
In multipeer communication decentralised probabilistic protocols have received a lot of attention because of their robustness against faults in the communication traffic and thei...
Boris Koldehofe
AE
2003
Springer
14 years 3 months ago
A Clustering Based Niching EA for Multimodal Search Spaces
Abstract. We propose a new niching method for Evolutionary Algorithms which is able to identify and track global and local optima in a multimodal search space. To prevent the loss ...
Felix Streichert, Gunnar Stein, Holger Ulmer, Andr...