Sciweavers

4983 search results - page 750 / 997
» order 2008
Sort
View
MMSP
2008
IEEE
349views Multimedia» more  MMSP 2008»
15 years 10 months ago
Content based image retrieval using curvelet transform
Abstract—Feature extraction is a key issue in contentbased image retrieval (CBIR). In the past, a number of texture features have been proposed in literature, including statistic...
Ishrat Jahan Sumana, Md. Monirul Islam, Dengsheng ...
MUE
2008
IEEE
173views Multimedia» more  MUE 2008»
15 years 10 months ago
Efficient Data Dissemination in Mobile P2P Ad-Hoc Networks for Ubiquitous Computing
In this paper we propose Rank-Based Broadcast (RBB) algorithm using High Order Markov Chain (HOMC) with weight values in mobile p2p ad-hoc networks (MOPNET) for ubiquitous. RBB us...
Do-Hoon Kim, Myoung Rak Lee, Longzhe Han, Hoh Pete...
MUE
2008
IEEE
177views Multimedia» more  MUE 2008»
15 years 10 months ago
Abnormal Gait Detection Using Discrete Fourier Transform
Detection of gait characteristics has found considerable interest in field of biomechanics and rehabilitation sciences. In this paper an approach for abnormal gait detection emplo...
Ahmed Mostayed, Mohammad Mynuddin Gani Mazumder, S...
MUE
2008
IEEE
83views Multimedia» more  MUE 2008»
15 years 10 months ago
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks
Denial of service attacks occur when the attacks are from a single host, whereas distributed denial of service attacks occur when multiple affected systems flood the bandwidth or ...
Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsun...
NDSS
2008
IEEE
15 years 10 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song