Sciweavers

5962 search results - page 1111 / 1193
» Working with Patterns and Code
Sort
View
130
Voted
MONET
2008
150views more  MONET 2008»
15 years 2 months ago
A Multi-radio 802.11 Mesh Network Architecture
Routers equipped with multiple 802.11 radios can alleviate capacity problems in wireless mesh networks. However, a practical, complete system architecture that can realize the bene...
Krishna N. Ramachandran, Irfan Sheriff, Elizabeth ...
125
Voted
MTA
2006
283views more  MTA 2006»
15 years 2 months ago
An evaluation of image based steganography methods
- Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyo...
Karen Bailey, Kevin Curran
147
Voted
PAMI
2006
186views more  PAMI 2006»
15 years 2 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...
144
Voted
PR
2006
113views more  PR 2006»
15 years 2 months ago
Face recognition from a single image per person: A survey
One of the main challenges faced by the current face recognition techniques lies in the difficulties of collecting samples. Fewer samples per person mean less laborious effort for...
Xiaoyang Tan, Songcan Chen, Zhi-Hua Zhou, Fuyan Zh...
123
Voted
PR
2006
154views more  PR 2006»
15 years 2 months ago
A fuzzy logic approach for detection of video shot boundaries
Video temporal segmentation is normally the first and important step for content-based video applications. Many features including the pixel difference, colour histogram, motion, ...
Hui Fang, Jianmin Jiang, Yue Feng
« Prev « First page 1111 / 1193 Last » Next »