Sciweavers

5451 search results - page 929 / 1091
» The SIGNAL Expert System
Sort
View
CCS
2009
ACM
16 years 4 months ago
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
CVPR
2005
IEEE
16 years 6 months ago
Computer Vision for Music Identification
We describe how certain tasks in the audio domain can be effectively addressed using computer vision approaches. This paper focuses on the problem of music identification, where t...
Yan Ke, Derek Hoiem, Rahul Sukthankar
ICIP
2000
IEEE
16 years 5 months ago
A Novel Scheme for Image Rotation for Document Processing
Rotation of the binary image of a document page for correcting the skew in the case of OCR or signature verification systems entails disfigurement of the shape of the characters, ...
Kaushik Mahata, A. G. Ramakrishnan
126
Voted
ICIP
1997
IEEE
16 years 5 months ago
Biorthogonal Quincunx Coifman Wavelets
We de ne and construct a new family of compactly supported, nonseparable two-dimensional wavelets, biorthogonal quincunx Coifman wavelets" BQCWs, from their one-dimensional c...
Dong Wei, Brian L. Evans, Alan C. Bovik
DAC
2009
ACM
16 years 5 months ago
Mode grouping for more effective generalized scheduling of dynamic dataflow applications
For a number of years, dataflow concepts have provided designers of digital signal processing systems with environments capable of expressing high-level software architectures as ...
William Plishker, Nimish Sane, Shuvra S. Bhattacha...