Posts

old
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching

A Novel Data Embedding Method Using Adaptive Pixel Pair...

A Novel Data Embedding Method Using Adaptive Pixel Pair Matching

old
A Probabilistic Model of t

A Probabilistic Model of t

A Probabilistic Model of t

old
n Visual Cryptography Scheme With Dynamic Group

n Visual Cryptography Scheme With Dynamic Group

n Visual Cryptography Scheme With Dynamic Group

old
Active Visual Segmentation

Active Visual Segmentation

Active Visual Segmentation

old
Image Segmentation Based on the Poincaré Map Method

Image Segmentation Based on the Poincaré Map Method

Image Segmentation Based on the Poincaré Map Method

old
K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER

K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR...

K-N SECRET SHARING VISUAL CRYPTOGRAPHY SCHEME FOR COLOR IMAGE USING RANDOM NUMBER

old
Multiple exposure fusion for high dynamic range  image acquisition

Multiple exposure fusion for high dynamic range image ...

Multiple exposure fusion for high dynamic range image acquisition

old
Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval

Semisupervised Biased Maximum Margin Analysis for Inter...

Semisupervised Biased Maximum Margin Analysis for Interactive Image Retrieval

old
Smile Detection by Boosting Pixel Differences

Smile Detection by Boosting Pixel Differences

Smile Detection by Boosting Pixel Differences

old
View-invariant action recognition based on Artificial Neural Networks

View-invariant action recognition based on Artificial N...

View-invariant action recognition based on Artificial Neural Networks

old
Cooperative Download in Vehicular Environments

Cooperative Download in Vehicular Environments

Cooperative Download in Vehicular Environments

old
Distributed Throughput Maximization in Wireless Networks via Random Power Allocation

Distributed Throughput Maximization in Wireless Network...

Distributed Throughput Maximization in Wireless Networks via Random Power Alloca...

old
Network Assisted Mobile Computing with Optimal Uplink Query Processing

Network Assisted Mobile Computing with Optimal Uplink Q...

Network Assisted Mobile Computing with Optimal Uplink Query Processing

old
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper

Protecting Location Privacy in Sensor Networks against ...

Protecting Location Privacy in Sensor Networks against a Global Eavesdropper

old
Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks

Toward Reliable Data Delivery for Highly Dynamic Mobile...

Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks

old
Revisiting Defenses against Large-Scale Online Password Guessing Attacks

Revisiting Defenses against Large-Scale Online Password...

Revisiting Defenses against Large-Scale Online Password Guessing Attacks