2005

Information Processing and Security Systems

Editors:

ISBN: 978-0-387-25091-5 (Print) 978-0-387-26325-0 (Online)

Table of contents (42 chapters)

previous Page of 3
  1. Digital Image and Signal Processing

    1. No Access

      Book Chapter

      Pages 3-12

      Fourier Descritpor-Based Deformable Models for Segmentation of the Distal Femur in CT

    2. No Access

      Book Chapter

      Pages 13-22

      Hierarchical Segmentation of Sparse Surface Data Using Energy-Minimization Approach

    3. No Access

      Book Chapter

      Pages 23-31

      Interactive Real-time Image Analysis System for Distant Operation

    4. No Access

      Book Chapter

      Pages 33-42

      Analysis/Synthesis Speech Model Based on the Pitch-Tracking Periodic-Aperiodic Decomposition

    5. No Access

      Book Chapter

      Pages 43-54

      Bio-inspired voice activity detector based on the human speech properties in the modulation domain

    6. No Access

      Book Chapter

      Pages 55-66

      A New Step in Arabic Speech Identification: Spoken Digit Recognition

    7. No Access

      Book Chapter

      Pages 67-76

      Split Vector Quantization of Psychoacoustical Modified LSF Coefficients in Speech Coder Based on Pitch-Tracking Periodic-Aperiodic Decomposition

    8. No Access

      Book Chapter

      Pages 77-86

      New results in 3D views of polyhedron generation on view sphere with perspective projection

    9. No Access

      Book Chapter

      Pages 87-94

      Gram-Schmidt Orthonormalization-Based Color Model for Object Detection

    10. No Access

      Book Chapter

      Pages 95-102

      Eyes detection with motion interpretation

    11. No Access

      Book Chapter

      Pages 103-111

      Financial Distress Prediction Using Different Pattern Recognition Methods

    12. No Access

      Book Chapter

      Pages 113-122

      Genetic algorithms applied to optimal arrangement of collocation points in 3D potential boundary-value problems

  2. Computer Security and Safety

    1. No Access

      Book Chapter

      Pages 125-134

      Fast Computation of Approximation Tables

    2. No Access

      Book Chapter

      Pages 135-148

      Cryptographic Properties of Some Cryptosystem with Modulation of the Chaotic Sequence Parameters

    3. No Access

      Book Chapter

      Pages 149-158

      Keys distribution for asymmetric cryptographic systems

    4. No Access

      Book Chapter

      Pages 159-166

      Two-pattern test generation with low power consumption based on LFSR

    5. No Access

      Book Chapter

      Pages 167-174

      Unauthorized servers for online certificates status verification

    6. No Access

      Book Chapter

      Pages 175-185

      Micropayments with Privacy — a New Proposal for E-commerce

    7. No Access

      Book Chapter

      Pages 187-196

      A model-based approach to analysis of authentication protocols

    8. No Access

      Book Chapter

      Pages 197-206

      Accessibility of information in realtime systems

previous Page of 3