Sciweavers

2490 search results - page 490 / 498
» A General Method for Feature Matching and Model Extraction
Sort
View
PODC
2003
ACM
14 years 22 days ago
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
Applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery require that fair exchange be assured. A fair-exchange protocol allo...
Jung Min Park, Edwin K. P. Chong, Howard Jay Siege...
CIVR
2008
Springer
245views Image Analysis» more  CIVR 2008»
13 years 9 months ago
Probabilistic optimized ranking for multimedia semantic concept detection via RVM
We present a probabilistic ranking-driven classifier for the detection of video semantic concept, such as airplane, building, etc. Most existing concept detection systems utilize ...
Yantao Zheng, Shi-Yong Neo, Tat-Seng Chua, Qi Tian
TCSV
2002
167views more  TCSV 2002»
13 years 7 months ago
Three-dimensional subband coding techniques for wireless video communications
This paper presents a new 3-D subband coding framework that is able to achieve a good balance between high compression performance and channel error resilience. Various data transf...
Hong Man, Ricardo L. de Queiroz, Mark J. T. Smith
WEBI
2010
Springer
13 years 5 months ago
How to Improve Your Google Ranking: Myths and Reality
Abstract--Search engines have greatly influenced the way people access information on the Internet as such engines provide the preferred entry point to billions of pages on the Web...
Ao-Jan Su, Y. Charlie Hu, Aleksandar Kuzmanovic, C...
CCS
2007
ACM
14 years 1 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen