Sciweavers

1610 search results - page 222 / 322
» Identity Based Multisignatures
Sort
View
ICDE
2007
IEEE
176views Database» more  ICDE 2007»
14 years 5 months ago
Finding Important People in Large News Video Databases Using Multimodal and Clustering Analysis
The wide availability of large scale databases requires more efļ¬cient and scalable tools for data understanding and knowledge discovery. In this paper, we present a method to ļ¬...
Duy-Dinh Le, Shin'ichi Satoh, Michael E. Houle, Da...
CIVR
2007
Springer
178views Image Analysis» more  CIVR 2007»
14 years 5 months ago
Layout indexing of trademark images
Ensuring the uniqueness of trademark images and protecting their identities are the most important objectives for the trademark registration process. To prevent trademark infringe...
Reinier H. van Leuken, M. Fatih Demirci, Victoria ...
ISCAS
2006
IEEE
112views Hardware» more  ISCAS 2006»
14 years 5 months ago
Differential and geometric properties of Rayleigh quotients with applications
the following cost functions: In this paper, learning rules are proposed for simultaneous corn- GI(U) = tr{(UTU)(UTBU)-lD, (la) putation of minor eigenvectors of a covariance matri...
M. A. Hasan
MM
2006
ACM
180views Multimedia» more  MM 2006»
14 years 5 months ago
Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation
The identiļ¬cation of near-duplicate keyframe (NDK) pairs is a useful task for a variety of applications such as news story threading and content-based video search. In this pape...
Chong-Wah Ngo, Wanlei Zhao, Yu-Gang Jiang
CCS
2003
ACM
14 years 4 months ago
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
Network based intruders seldom attack directly from their own hosts, but rather stage their attacks through intermediate ā€œstepping stonesā€ to conceal their identity and origin...
Xinyuan Wang, Douglas S. Reeves