Sciweavers

2236 search results - page 344 / 448
» Intrusion detection techniques and approaches
Sort
View
ICCSA
2007
Springer
14 years 3 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...
ICMCS
2006
IEEE
149views Multimedia» more  ICMCS 2006»
14 years 3 months ago
Semantic 3D Face Mesh Simplification for Transmission and Visualization
Three-dimensional data generated from range scanners is usually composed of a huge amount of information. Simplification and compression techniques must be adopted in order to red...
Alessandro Colombo, Claudio Cusano, Raimondo Schet...
IJCNN
2006
IEEE
14 years 3 months ago
Training Coordination Proxy Agents
— Delegating the coordination role to proxy agents can improve the overall outcome of the task at the expense of cognitive overload due to switching subtasks. Stability and commi...
Myriam Abramson, William Chao, Ranjeev Mittu
MMM
2006
Springer
139views Multimedia» more  MMM 2006»
14 years 3 months ago
An attention based spatial adaptation scheme for H.264 videos on mobiles
When browsing videos in mobile devices, people often feel that resolution greatly affects their perceptual experience in the limited screen size. In this paper, an attention based...
Yi Wang, Xin Fan, Houqiang Li, Zhengkai Liu, Mingj...
GIR
2006
ACM
14 years 3 months ago
Handling Locations in Search Engine Queries
This paper proposes simple techniques for handling place references in search engine queries, an important aspect of geographical information retrieval. We address not only the de...
Bruno Martins, Mário J. Silva, Sérgi...