Sciweavers

3356 search results - page 521 / 672
» Determining Consensus Numbers
Sort
View
ICIP
2010
IEEE
13 years 8 months ago
Undetectable image tampering through JPEG compression anti-forensics
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting ...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...
ICIP
2010
IEEE
13 years 8 months ago
Dynamic selection of a feature-rich query frame for mobile video retrieval
In this paper, we focus on a new application of mobile visual search: snapping a photo with a mobile device of a video playing on a TV screen to automatically retrieve and stream ...
David M. Chen, Ngai-Man Cheung, Sam S. Tsai, Vijay...
KDD
2010
ACM
188views Data Mining» more  KDD 2010»
13 years 8 months ago
Trust network inference for online rating data using generative models
In an online rating system, raters assign ratings to objects contributed by other users. In addition, raters can develop trust and distrust on object contributors depending on a f...
Freddy Chong Tat Chua, Ee-Peng Lim
PIMRC
2010
IEEE
13 years 8 months ago
Connectivity in wireless networks with dynamic key compromise and recovery
Abstract--This paper considers the problem of key management in wireless networks. In particular, we investigate the effect of dynamic key compromise and recovery on connectivity i...
Satashu Goel, Aylin Yener
PIMRC
2010
IEEE
13 years 8 months ago
Enhanced parity packet transmission for Video multicast using R-DSTC
In this paper, a cooperative multicast scheme that uses Randomized Distributed Space Time Codes (RDSTC), along with packet level Forward Error Correction (FEC), is studied. For the...
Ozgu Alay, Zhili Guo, Yao Wang, Elza Erkip, Shiven...