咨询与建议

限定检索结果

文献类型

  • 111 篇 会议
  • 27 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 140 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 70 篇 工学
    • 39 篇 电气工程
    • 25 篇 计算机科学与技术...
    • 19 篇 信息与通信工程
    • 12 篇 软件工程
    • 4 篇 仪器科学与技术
    • 2 篇 电子科学与技术(可...
    • 2 篇 生物工程
    • 1 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 控制科学与工程
    • 1 篇 生物医学工程(可授...
  • 56 篇 理学
    • 50 篇 物理学
    • 3 篇 系统科学
    • 2 篇 生物学
  • 43 篇 医学
    • 43 篇 临床医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 16 篇 computer communi...
  • 15 篇 information syst...
  • 14 篇 artificial intel...
  • 11 篇 information stor...
  • 10 篇 steganography
  • 9 篇 algorithm analys...
  • 8 篇 software enginee...
  • 7 篇 mobile communica...
  • 7 篇 image processing...
  • 6 篇 security
  • 5 篇 database managem...
  • 5 篇 multimedia
  • 5 篇 steganalysis
  • 4 篇 multimedia commu...
  • 4 篇 decoding
  • 3 篇 image enhancemen...
  • 3 篇 jpeg
  • 3 篇 information
  • 3 篇 biology
  • 3 篇 processor ectrop...

机构

  • 7 篇 king saud univer...
  • 7 篇 information syst...
  • 4 篇 univ texas san a...
  • 4 篇 razak faculty of...
  • 4 篇 brandenburg univ...
  • 3 篇 cuny coll staten...
  • 3 篇 tufts univ dept ...
  • 3 篇 advanced informa...
  • 2 篇 international is...
  • 2 篇 vsb – technical ...
  • 2 篇 university of ol...
  • 2 篇 univ s alabama m...
  • 2 篇 hewlett packard ...
  • 2 篇 aricent technol ...
  • 2 篇 tufts univ dept ...
  • 2 篇 mobile devices s...
  • 2 篇 univ s alabama d...
  • 2 篇 hannam universit...
  • 2 篇 university of ta...
  • 1 篇 ntt information ...

作者

  • 15 篇 eyas el-qawasmeh
  • 10 篇 agaian sos s.
  • 8 篇 azizah abd manaf
  • 5 篇 creutzburg reine...
  • 5 篇 collins james c.
  • 5 篇 agaian sos
  • 4 篇 akram zeki
  • 4 篇 salwani mohd dau...
  • 4 篇 jan platos
  • 4 篇 rabiah ahmad
  • 4 篇 shamsul sahibudd...
  • 4 篇 suriayati chupra...
  • 4 篇 alsharif salim
  • 4 篇 mazdak zamani
  • 3 篇 kroeger knut
  • 3 篇 feria erlan h.
  • 3 篇 panetta karen
  • 3 篇 tai-hoon kim
  • 3 篇 hocine cherifi
  • 3 篇 jasni mohamad za...

语言

  • 135 篇 英文
  • 4 篇 中文
  • 1 篇 其他
检索条件"任意字段=Conference on Mobile Multimedia/Image Processing, Security, and Applications 2010"
140 条 记 录,以下是1-10 订阅
排序:
mobile multimedia/image processing, security, and applications 2010
Mobile Multimedia/Image Processing, Security, and Applicatio...
收藏 引用
mobile multimedia/image processing, security, and applications 2010
The proceedings contain 33 papers. The topics discussed include: cell phones as imaging sensors;experimental study on GMM-based speaker recognition;a new approach for sclera vein recognition;multimodal eye recognition...
来源: 评论
eBiometrics: an enhanced multi-biometrics authentication technique for real-time remote applications on mobile devices
eBiometrics: an enhanced multi-biometrics authentication tec...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Kuseler, Torben Lami, Ihsan Jassim, Sabah Sellahewa, Harin Univ Buckingham Dept Appl Comp Buckingham MK18 1EG England
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as image capture, Location applications, and Biometric authentication such as Fingerprint veri... 详细信息
来源: 评论
Mean field game theoretic approach for security in mobile ad-hoc networks
Mean field game theoretic approach for security in mobile ad...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Wang, Yanwei Tang, Helen Yu, F. Richard Huang, Minyi Carleton Univ Dept Syst & Comp Eng Ottawa ON K1S 5B6 Canada Defence R&D Canada Ottawa Ottawa ON Canada Carleton Univ Sch Math & Stat Ottawa ON K1S 5B6 Canada
Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most existing work on applying game theories to security only considers two players in the security game model: a... 详细信息
来源: 评论
An Edge Detector based Integrated Database Framework for security applications
An Edge Detector based Integrated Database Framework for Sec...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Veeraraghavan, Sampathkumar Panetta, Karen Agaian, Sos Tufts Univ Dept Elect & Comp Engn Medford MA 02155 USA
In this paper, an integrated framework comprising of computer vision algorithms, Database system and Batch processing techniques has been developed to facilitate effective automatic threat recognition and detection fo... 详细信息
来源: 评论
On privacy-protected outsourced processing for mobile multimedia
On privacy-protected outsourced processing for mobile multim...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Svendsen, Tristen Wang, Zhaohong Calif State Univ Chico Elect & Comp Engn Dept Chico CA 95929 USA
mobile devices are usually computationally restricted in carrying out complicated processing algorithms on its multimedia document. While cloud computing provides resources for customers, a major concern is the custom... 详细信息
来源: 评论
Cell Phones as Imaging Sensors
Cell Phones as Imaging Sensors
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Bhatti, Nina Baker, Harlyn Marguier, Joanna Berclaz, Jerome Suesstrunk, Sabine Hewlett Packard Labs 1501 Page Mill Dr Palo Alto CA 94304 USA Ecole Polytech Fed Lausanne Sch Comp & Commun Sci IC Lausanne Switzerland
Camera phones are ubiquitous, and consumers have been adopting them faster than any other technology in modern history. When connected to a network, though, they are capable of more than just picture taking: Suddenly,... 详细信息
来源: 评论
Improving the recognition of fingerprint biometric system using enhanced image fusion
Improving the recognition of fingerprint biometric system us...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Alsharif, Salim El-Saba, Aed Stripathi, Reshma Univ S Alabama Dept Elect & Comp Engn Mobile AL 36688 USA
Fingerprints recognition systems have been widely used by financial institutions, law enforcement, border control, visa issuing, just to mention few. Biometric identifiers can be counterfeited, but considered more rel... 详细信息
来源: 评论
Creating Wi-Fi Bluetooth Mesh Network for Crisis Management applications
Creating Wi-Fi Bluetooth Mesh Network for Crisis Management ...
收藏 引用
conference on mobile multimedia/image processing, security, and applications 2010
作者: Al-Tekreeti, Safa Adams, Chris Al-Jawad, Naseer Univ Buckingham Appl Comp Dept Buckingham MK181EG England
This paper proposes a wireless mesh network implementation consisting of both Wi-Fi Ad-Hoc networks as well as Bluetooth Piconet/Scatternet networks, organised in an energy and throughput efficient structure. This typ... 详细信息
来源: 评论
Adjunctive Numerical Relation Codes in multimedia Signal Covers
Adjunctive Numerical Relation Codes in Multimedia Signal Cov...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Collins, James C. Agaian, Sos S. Univ Texas San Antonio Multimedia & Mobile Signal Proc Lab San Antonio TX USA
This paper introduces a new redundant number system, the adjunctive numerical relation (ANR) codes, which offer improvements over other well known systems such as the Fibonacci, Lucas, and the Prime number systems whe... 详细信息
来源: 评论
European activities in civil applications of drones: an overview of remotely piloted aircraft systems (RPAS)
European activities in civil applications of drones: an over...
收藏 引用
conference on mobile multimedia/image processing, security, and applications
作者: Creutzburg, Reiner Brandenburg Univ Appl Sci Dept Informat & Media D-14737 Brandenburg Germany
The aim of this paper is to give an overview of recent research, development and civil application of remotely piloted aircraft systems (RPAS) in Europe. It describes a European strategy for the development of civil a... 详细信息
来源: 评论