Sciweavers

112 search results - page 16 / 23
» An informed synchronization scheme for audio data hiding
Sort
View
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
14 years 1 months ago
Evaluating Branching Programs on Encrypted Data
Abstract. We present a public-key encryption scheme with the following properties. Given a branching program P and an encryption c of an input x, it is possible to efficiently com...
Yuval Ishai, Anat Paskin
TASLP
2010
188views more  TASLP 2010»
13 years 5 months ago
MusicBox: Personalized Music Recommendation Based on Cubic Analysis of Social Tags
—Social tagging is becoming increasingly popular in music information retrieval (MIR). It allows users to tag music items like songs, albums, or artists. Social tags are valuable...
Alexandros Nanopoulos, Dimitrios Rafailidis, Panag...
ICMCS
2006
IEEE
180views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Automatic Speaker Segmentation using Multiple Features and Distance Measures: A Comparison of Three Approaches
This paper addresses the problem of unsupervised speaker change detection. Three systems based on the Bayesian Information Criterion (BIC) are tested. The first system investigat...
Margarita Kotti, Luis P. M. Martins, Emmanouil Ben...
JDFP
2006
139views more  JDFP 2006»
13 years 7 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
MM
2003
ACM
120views Multimedia» more  MM 2003»
14 years 19 days ago
Linking multimedia presentations with their symbolic source documents: algorithm and applications
An algorithm is presented that automatically matches images of presentation slides to the symbolic source file (e.g., PowerPointTM or AcrobatTM ) from which they were generated. T...
Berna Erol, Jonathan J. Hull, Dar-Shyang Lee