Sciweavers

796 search results - page 98 / 160
» Spoofing prevention method
Sort
View
ICIAP
2005
ACM
14 years 10 months ago
Greedy Algorithm for Local Contrast Enhancement of Images
Abstract. We present a technique that achieves local contrast enhancement by representing it as an optimization problem. For this, we first introduce a scalar objective function th...
Kartic Subr, Aditi Majumder, Sandy Irani
ICSE
2005
IEEE-ACM
14 years 10 months ago
Helping users avoid bugs in GUI applications
In this paper, we propose a method to help users avoid bugs in GUI applications. In particular, users would use the application normally and report bugs that they encounter to pre...
Amir Michail, Tao Xie
PERCOM
2003
ACM
14 years 9 months ago
A High Performance Privacy-Oriented Location System
Many mobile applications can be greatly enhanced when provided with the locations of people and devices. Ultrasonic location systems have been shown to supply location information...
Mike Hazas, Andy Ward
MOBIHOC
2008
ACM
14 years 9 months ago
P2P-based routing and data management using the virtual cord protocol (VCP)
We present Virtual Cord Protocol (VCP), a virtual relative position based routing protocol for sensor networks that also provides methods for data management as known from standar...
Abdalkarim Awad, Reinhard German, Falko Dressler
CVPR
2010
IEEE
14 years 6 months ago
Online-Batch Strongly Convex Multi Kernel Learning
Several object categorization algorithms use kernel methods over multiple cues, as they offer a principled approach to combine multiple cues, and to obtain state-of-theart perform...
Francesco Orabona, Jie Luo, Barbara Caputo