Sciweavers

1228 search results - page 106 / 246
» Manipulation of Pose Distributions
Sort
View
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
15 years 10 months ago
Error resilient content-based image authentication over wireless channel
—The pervasive distribution of digital images triggers an emergent need of authenticating degraded images by lossy compression and transmission. This paper proposes a robust cont...
Shuiming Ye, Qibin Sun, Ee-Chien Chang
AIRWEB
2005
Springer
15 years 10 months ago
Cloaking and Redirection: A Preliminary Study
Cloaking and redirection are two possible search engine spamming techniques. In order to understand cloaking and redirection on the Web, we downloaded two sets of Web pages while ...
Baoning Wu, Brian D. Davison
GCC
2005
Springer
15 years 10 months ago
Supporting Remote Collaboration Through Structured Activity Logging
Abstract. This paper describes an integrated architecture for online collaborative multimedia (audio and text) meetings which supports the recording of participants' audio exc...
Matt-Mouley Bouamrane, Saturnino Luz, Masood Masoo...
ICWE
2005
Springer
15 years 10 months ago
A Model-Based Approach for Integrating Third Party Systems with Web Applications
New Web applications are rapidly moving from stand-alone systems to distributed applications that need to interoperate with third party systems, such as external Web services or le...
Nathalie Moreno, Antonio Vallecillo
MIDDLEWARE
2005
Springer
15 years 10 months ago
Network Processing of Documents, for Documents, by Documents
This paper presents a content-dependent and configurable framework for the network processing of documents. Like existing compound document frameworks, it enables an enriched docu...
Ichiro Satoh