Sciweavers

218 search results - page 19 / 44
» Using Derivation Trees for Treebank Error Detection
Sort
View
ICPR
2004
IEEE
14 years 9 months ago
Real-Time Face Detection Using Boosting in Hierarchical Feature Spaces
Boosting-basedmethods have recently led to the state-ofthe-art face detection systems. In these systems, weak classifiers to be boosted are based on simple, local, Haar-like featu...
Daniel Gatica-Perez, Dong Zhang, Stan Z. Li
ICC
2008
IEEE
113views Communications» more  ICC 2008»
14 years 2 months ago
Complexity Reduction of Maximum-Likelihood Multiuser Detection (ML-MUD) Receivers with Carrier Interferometry Codes in MC-CDMA
—We propose to use carrier interferometry (CI) codes to reduce the complexity of the maximumlikelihood multiuser-detection (ML-MUD) receiver in MC-CDMA systems with carrier frequ...
Layla Tadjpour, Shang-Ho Tsai, C. C. Jay Kuo
ICPR
2008
IEEE
14 years 2 months ago
Detecting information-hiding in WAV audios
In this article, we propose a steganalysis method for detecting the presence of information-hiding behavior in wav audios. We extract the neighboring joint distribution features a...
Qingzhong Liu, Andrew H. Sung, Mengyu Qiao
PR
2008
206views more  PR 2008»
13 years 8 months ago
A study of graph spectra for comparing graphs and trees
The spectrum of a graph has been widely used in graph theory to characterise the properties of a graph and extract information from its structure. It has also been employed as a g...
Richard C. Wilson, Ping Zhu
CORR
2007
Springer
117views Education» more  CORR 2007»
13 years 8 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin