Sciweavers

1437 search results - page 168 / 288
» Content Extraction Signatures
Sort
View
144
Voted
MM
2006
ACM
155views Multimedia» more  MM 2006»
15 years 8 months ago
Robust voting algorithm based on labels of behavior for video copy detection
This paper presents an efficient approach for copies detection in a large videos archive consisting of several hundred of hours. The video content indexing method consists of ext...
Julien Law-To, Olivier Buisson, Valérie Gou...
CIKM
2008
Springer
15 years 4 months ago
Creating tag hierarchies for effective navigation in social media
In social media, such as blogs, since the content naturally evolves over time, it is hard or in many cases impossible to organize the content for effective navigation. Thus, one c...
K. Selçuk Candan, Luigi Di Caro, Maria Luis...
120
Voted
ECCV
1998
Springer
16 years 4 months ago
Shape Representations from Shading Primitives
Diffuse interreflections mean that surface shading and shape are related in ways that are difficult to untangle; in particular, distant and invisible surfaces may affect the shadi...
John A. Haddon, David A. Forsyth
EUROSYS
2006
ACM
15 years 11 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
114
Voted
ACSAC
2006
IEEE
15 years 8 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh