Sciweavers

474 search results - page 88 / 95
» Multimedia Surveillance and Monitoring
Sort
View
ICMCS
2006
IEEE
138views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Detecting Malicious Hosts in the Presence of Lying Hosts in Peer-to-Peer Streaming
Current peer-to-peer (P2P) streaming systems often assume that hosts are cooperative. However, this may not be true in the open environment of the Internet. In this paper, we disc...
Xing Jin, S.-H. Gary Chan, Wai-Pun Ken Yiu, Yongqi...
ICMCS
2005
IEEE
94views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Video booklet
In this paper, we propose a novel system, Video Booklet, which enables efficient and nature video browsing and searching. In the system, a set of selected thumbnails excerpted fro...
Xian-Sheng Hua, Shipeng Li, Hong-Jiang Zhang
MM
2005
ACM
152views Multimedia» more  MM 2005»
14 years 1 months ago
A repeated video clip identification system
Identifying short repeated video clips, such as news program logo, station logo, TV commercials, etc., from broadcasting video databases or streams is important for video content ...
Xianfeng Yang, Ping Xue, Qi Tian
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes
EUROPAR
2005
Springer
14 years 1 months ago
Integrating Mobile Devices into the Grid: Design Considerations and Evaluation
Mobile devices increasingly offer functionality beyond the one provided by traditional resources – processor, memory and applications. This includes, for example, integrated mul...
Stavros Isaiadis, Vladimir Getov