Sciweavers

796 search results - page 71 / 160
» Spoofing prevention method
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
Tone detection of non-uniformly undersampled signals with frequency excision
We address the problem of detecting and locating narrowband tones in an undersampled signal. It is known that uniformly undersampled signals exhibit frequency aliasing, whereby th...
André Bourdoux, Sofie Pollin, Antoine Dejon...
ICASSP
2011
IEEE
13 years 1 months ago
Informed secure watermarking using optimal transport
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, whe...
Patrick Bas
ICCV
2011
IEEE
12 years 10 months ago
Tracking Multiple People under Global Appearance Constraints
In this paper, we show that tracking multiple people whose paths may intersect can be formulated as a convex global optimization problem. Our proposed framework is designed to exp...
Horesh Ben Shitrit, Jerome Berclaz, Francois Fleur...
ISBI
2006
IEEE
14 years 10 months ago
Joint texture and topography estimation for extended depth of field in brightfield microscopy
Brightfield microscopy often suffers from limited depth of field, which prevents thick specimens from being imaged entirely in-focus. By optically sectioning the specimen, the inf...
François Aguet, Dimitri Van De Ville, Micha...
CCS
2009
ACM
14 years 4 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon