Proceedings of the ... American Control Conference. American Control Conference最新文献

筛选
英文 中文
An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing 基于LSB替换和像素值差分的彩色图像自适应隐写方法
Proceedings of the ... American Control Conference. American Control Conference Pub Date : 2011-07-22 DOI: 10.1007/978-3-642-22714-1_55
Azzat A. Al-Sadi, El-Sayed M. El-Alfy
{"title":"An Adaptive Steganographic Method for Color Images Based on LSB Substitution and Pixel Value Differencing","authors":"Azzat A. Al-Sadi, El-Sayed M. El-Alfy","doi":"10.1007/978-3-642-22714-1_55","DOIUrl":"https://doi.org/10.1007/978-3-642-22714-1_55","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"2012 1","pages":"535-544"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82640599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks 无线网状网络的匿名认证与通信协议
Proceedings of the ... American Control Conference. American Control Conference Pub Date : 2011-07-22 DOI: 10.1007/978-3-642-22726-4_60
Jaydip Sen
{"title":"An Anonymous Authentication and Communication Protocol for Wireless Mesh Networks","authors":"Jaydip Sen","doi":"10.1007/978-3-642-22726-4_60","DOIUrl":"https://doi.org/10.1007/978-3-642-22726-4_60","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"10 1","pages":"580-592"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86757063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mach-Zehnder Interferometer Based All-Optical Peres Gate 基于Mach-Zehnder干涉仪的全光Peres门
Proceedings of the ... American Control Conference. American Control Conference Pub Date : 2011-07-22 DOI: 10.1007/978-3-642-22720-2_25
G. Maity, J. N. Roy, S. Maity
{"title":"Mach-Zehnder Interferometer Based All-Optical Peres Gate","authors":"G. Maity, J. N. Roy, S. Maity","doi":"10.1007/978-3-642-22720-2_25","DOIUrl":"https://doi.org/10.1007/978-3-642-22720-2_25","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"10 1","pages":"249-258"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88838735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
SMMAG: SNMP-Based MPLS-TE Management Using Mobile Agents SMMAG:基于snmp的MPLS-TE移动代理管理
Proceedings of the ... American Control Conference. American Control Conference Pub Date : 2011-07-22 DOI: 10.1007/978-3-642-22714-1_48
Muhammad Tahir, D. Gaïti, M. Khan
{"title":"SMMAG: SNMP-Based MPLS-TE Management Using Mobile Agents","authors":"Muhammad Tahir, D. Gaïti, M. Khan","doi":"10.1007/978-3-642-22714-1_48","DOIUrl":"https://doi.org/10.1007/978-3-642-22714-1_48","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"16 1","pages":"471-479"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83060320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Trace Transform Based Feature Extraction Architecture for CBIR 优化的基于轨迹变换的CBIR特征提取体系
Proceedings of the ... American Control Conference. American Control Conference Pub Date : 2011-07-22 DOI: 10.1007/978-3-642-22720-2_46
M. Meena, K. Pramod, K. Linganagouda
{"title":"Optimized Trace Transform Based Feature Extraction Architecture for CBIR","authors":"M. Meena, K. Pramod, K. Linganagouda","doi":"10.1007/978-3-642-22720-2_46","DOIUrl":"https://doi.org/10.1007/978-3-642-22720-2_46","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"34 1","pages":"444-451"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80734593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Copyright Protection Scheme Using Visual Cryptography 一种新的基于视觉密码的版权保护方案
Proceedings of the ... American Control Conference. American Control Conference Pub Date : 2011-07-22 DOI: 10.1007/978-3-642-22714-1_63
A. Nag, J. Singh, S. Biswas, D. Sarkar, P. Sarkar
{"title":"A Novel Copyright Protection Scheme Using Visual Cryptography","authors":"A. Nag, J. Singh, S. Biswas, D. Sarkar, P. Sarkar","doi":"10.1007/978-3-642-22714-1_63","DOIUrl":"https://doi.org/10.1007/978-3-642-22714-1_63","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"275 1","pages":"612-619"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83514660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Object Recognition Based on Fuzzy Morphological Polynomial Signal Representation 基于模糊形态多项式信号表示的目标识别
Proceedings of the ... American Control Conference. American Control Conference Pub Date : 2011-07-22 DOI: 10.1007/978-3-642-22720-2_34
Chin-Pan Huang, P. Huang, C. Hsieh, Tsorng-Lin Chia
{"title":"Object Recognition Based on Fuzzy Morphological Polynomial Signal Representation","authors":"Chin-Pan Huang, P. Huang, C. Hsieh, Tsorng-Lin Chia","doi":"10.1007/978-3-642-22720-2_34","DOIUrl":"https://doi.org/10.1007/978-3-642-22720-2_34","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"4 1","pages":"334-341"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85260687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Potential of Using Conventional Mobile Communication Technology for Human Context Awareness in Ubiquitous Computing 在普适计算中利用传统移动通信技术实现人类语境感知的潜力
Proceedings of the ... American Control Conference. American Control Conference Pub Date : 2011-07-22 DOI: 10.1007/978-3-642-22709-7_25
Abhijan Bhattacharyya
{"title":"On the Potential of Using Conventional Mobile Communication Technology for Human Context Awareness in Ubiquitous Computing","authors":"Abhijan Bhattacharyya","doi":"10.1007/978-3-642-22709-7_25","DOIUrl":"https://doi.org/10.1007/978-3-642-22709-7_25","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"14 1","pages":"242-249"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82015372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fuzzy Neuro Clustering Based Vector Quantization for Face Recognition 基于模糊神经聚类的矢量量化人脸识别
Proceedings of the ... American Control Conference. American Control Conference Pub Date : 2011-07-22 DOI: 10.1007/978-3-642-22720-2_40
Elizabeth B. Varghese, M. Wilscy
{"title":"A Fuzzy Neuro Clustering Based Vector Quantization for Face Recognition","authors":"Elizabeth B. Varghese, M. Wilscy","doi":"10.1007/978-3-642-22720-2_40","DOIUrl":"https://doi.org/10.1007/978-3-642-22720-2_40","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"1 1","pages":"383-395"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91100604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
I-SAODV: Improving SAODV to Mitigate Hop-Count Attack in Mobile Adhoc Network I-SAODV:改进SAODV以减轻移动自组网中的跳数攻击
Proceedings of the ... American Control Conference. American Control Conference Pub Date : 2011-07-22 DOI: 10.1007/978-3-642-22709-7_10
Sanjeev Rana, Manpreet Singh
{"title":"I-SAODV: Improving SAODV to Mitigate Hop-Count Attack in Mobile Adhoc Network","authors":"Sanjeev Rana, Manpreet Singh","doi":"10.1007/978-3-642-22709-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-22709-7_10","url":null,"abstract":"","PeriodicalId":74510,"journal":{"name":"Proceedings of the ... American Control Conference. American Control Conference","volume":"44 22 1","pages":"91-100"},"PeriodicalIF":0.0,"publicationDate":"2011-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76937830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信