Sciweavers

2983 search results - page 439 / 597
» The group marriage problem
Sort
View
ISCAS
2008
IEEE
100views Hardware» more  ISCAS 2008»
14 years 3 months ago
On the security of a class of image encryption schemes
— Recently four chaos-based image encryption schemes were proposed. Essentially, the four schemes can be classified into one class, which is composed of two basic parts: permuta...
Chengqing Li, Guanrong Chen
ISCAS
2008
IEEE
197views Hardware» more  ISCAS 2008»
14 years 3 months ago
Human activity recognition for video surveillance
—This paper presents a novel approach for automatic recognition of human activities from video sequences. We first group features with high correlations into Category Feature Vec...
Weiyao Lin, Ming-Ting Sun, Radha Poovendran, Zheng...
LCN
2008
IEEE
14 years 3 months ago
IPclip: An architecture to restore Trust-by-Wire in packet-switched networks
—During the last decades, the Internet has steadily developed into a mass medium. The target group radically changed compared to, e.g., the 90s. Because virtually everyone has ac...
Harald Widiger, Stephan Kubisch, Peter Danielis, J...
SEMCO
2008
IEEE
14 years 3 months ago
Disambiguating Sounds through Context
A central problem in automatic sound recognition is the mapping between low-level audio features and the meaningful content of an auditory scene. We propose a dynamic network mode...
Maria E. Niessen, Leendert van Maanen, Tjeerd C. A...
AH
2008
Springer
14 years 3 months ago
Concept-Based Document Recommendations for CiteSeer Authors
The information explosion in today’s electronic world has created the need for information filtering techniques that help users filter out extraneous content to identify the righ...
Kannan Chandrasekaran, Susan Gauch, Praveen Lakkar...