Search Results - "Schclar, A."

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Dimensionality reduction for detection of moving vehicles by Averbuch, A., Rabin, N., Schclar, A., Zheludev, V.

    Published in Pattern analysis and applications : PAA (01-02-2012)
    “…Automatic acoustic-based vehicle detection is a common task in security and surveillance systems. Usually, a recording device is placed in a designated area…”
    Get full text
    Journal Article
  2. 2

    A diffusion framework for detection of moving vehicles by Schclar, A., Averbuch, A., Rabin, N., Zheludev, V., Hochman, K.

    Published in Digital signal processing (2010)
    “…We introduce a novel real-time algorithm for automatic acoustic-based vehicle detection. Commonly, surveillance systems for this task use a microphone that is…”
    Get full text
    Journal Article
  3. 3

    Deblocking of block-transform compressed images using weighted sums of symmetrically aligned pixels by Averbuch, A.Z., Schclar, A., Donoho, D.L.

    Published in IEEE transactions on image processing (01-02-2005)
    “…A new class of related algorithms for deblocking block-transform compressed images and video sequences is proposed in this paper. The algorithms apply weighted…”
    Get full text
    Journal Article
  4. 4

    Deblocking of block-DCT compressed images using deblocking frames of variable size by Schclar, A., Averbuch, A., Donoho, D. L.

    “…A new algorithm for the removal of blocking artifacts in block-DCT compressed images and video sequences is proposed in this paper. The algorithm uses…”
    Get full text
    Conference Proceeding
  5. 5

    User Authentication Based on Representative Users by Schclar, A., Rokach, L., Abramson, A., Elovici, Y.

    “…User authentication based on username and password is the most common means to enforce access control. This form of access restriction is prone to hacking…”
    Get full text
    Journal Article
  6. 6

    A real-time algorithm for vision-based localization by Averbuch, A., Schclar, A.

    “…We present a real-time algorithm for the localization of an agent in an area whose topography is given. The data is organized in a matrix whose cells…”
    Get full text
    Conference Proceeding
  7. 7

    k-Anonymized Reducts by Rokach, L, Schclar, A

    “…Privacy preserving data mining aims to prevent the violation of privacy that might result from mining of sensitive data. This is commonly achieved by data…”
    Get full text
    Conference Proceeding