Search Results - "Schclar, A."
-
1
Dimensionality reduction for detection of moving vehicles
Published in Pattern analysis and applications : PAA (01-02-2012)“…Automatic acoustic-based vehicle detection is a common task in security and surveillance systems. Usually, a recording device is placed in a designated area…”
Get full text
Journal Article -
2
A diffusion framework for detection of moving vehicles
Published in Digital signal processing (2010)“…We introduce a novel real-time algorithm for automatic acoustic-based vehicle detection. Commonly, surveillance systems for this task use a microphone that is…”
Get full text
Journal Article -
3
Deblocking of block-transform compressed images using weighted sums of symmetrically aligned pixels
Published in IEEE transactions on image processing (01-02-2005)“…A new class of related algorithms for deblocking block-transform compressed images and video sequences is proposed in this paper. The algorithms apply weighted…”
Get full text
Journal Article -
4
Deblocking of block-DCT compressed images using deblocking frames of variable size
Published in 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing (01-05-2002)“…A new algorithm for the removal of blocking artifacts in block-DCT compressed images and video sequences is proposed in this paper. The algorithm uses…”
Get full text
Conference Proceeding -
5
User Authentication Based on Representative Users
Published in IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews (01-11-2012)“…User authentication based on username and password is the most common means to enforce access control. This form of access restriction is prone to hacking…”
Get full text
Journal Article -
6
A real-time algorithm for vision-based localization
Published in Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine (2004)“…We present a real-time algorithm for the localization of an agent in an area whose topography is given. The data is organized in a matrix whose cells…”
Get full text
Conference Proceeding -
7
k-Anonymized Reducts
Published in 2010 IEEE International Conference on Granular Computing (01-08-2010)“…Privacy preserving data mining aims to prevent the violation of privacy that might result from mining of sensitive data. This is commonly achieved by data…”
Get full text
Conference Proceeding