Sciweavers

1437 search results - page 7 / 288
» Content Extraction Signatures
Sort
View
ICMCS
2008
IEEE
135views Multimedia» more  ICMCS 2008»
14 years 1 months ago
Audio and video signatures for synchronization
Abstract— We propose a framework based on signatures extracted from audio and video streams for automatically measuring and maintaining synchronization between the two streams. T...
Regunathan Radhakrishnan, Kent Terry, Claus Bauer
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 2 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ICASSP
2010
IEEE
13 years 5 months ago
CBCD based on color features and landmark MDS-assisted distance estimation
Content-Based Copy Detection (CBCD) of digital videos is an important research field that aims at the identification of modified copies of an original clip, e.g., on the Intern...
Marzia Corvaglia, Fabrizio Guerrini, Riccardo Leon...
ICT
2004
Springer
181views Communications» more  ICT 2004»
14 years 22 days ago
Attack Evidence Detection, Recovery, and Signature Extraction with ADenoIdS
Abstract. This paper presents the ADenoIdS intrusion detection system (IDS). ADenoIdS takes some architectural inspiration from the human immune system and automates intrusion reco...
F. S. de Paula, P. L. de Geus
BIS
2006
106views Business» more  BIS 2006»
13 years 8 months ago
Expected Utility of Content Blocks in Web Content Extraction
In this paper we discuss the possible application of new concepts in web content extraction: utility assessment, utility annealing, and dynamic aggregated document generation. Aft...
Marek Kowalkiewicz