Sciweavers

827 search results - page 145 / 166
» On Compression of Encrypted Video
Sort
View
NSDI
2010
13 years 10 months ago
EndRE: An End-System Redundancy Elimination Service for Enterprises
In many enterprises today, WAN optimizers are being deployed in order to eliminate redundancy in network traffic and reduce WAN access costs. In this paper, we present the design ...
Bhavish Agarwal, Aditya Akella, Ashok Anand, Athul...
CTRSA
2011
Springer
223views Cryptology» more  CTRSA 2011»
13 years 4 days ago
Expedient Non-malleability Notions for Hash Functions
Non-malleability of a cryptographic primitive is a fundamental security property which ensures some sort of independence of cryptographic values. The notion has been extensively st...
Paul Baecher, Marc Fischlin, Dominique Schröd...
ICB
2009
Springer
183views Biometrics» more  ICB 2009»
14 years 3 months ago
Overview of the Multiple Biometrics Grand Challenge
The goal of the Multiple Biometrics Grand Challenge (MBGC) is to improve the performance of face and iris recognition technology from biometric samples acquired under unconstrained...
P. Jonathon Phillips, Patrick J. Flynn, J. Ross Be...
IAAI
2003
13 years 10 months ago
Broadcast News Understanding and Navigation
The Broadcast News Editor (BNE) and Broadcast News Navigator (BNN) are fully implemented systems that exploit integrated image, speech, and language processing to support intellig...
Mark T. Maybury
PAMI
2002
150views more  PAMI 2002»
13 years 8 months ago
Object Tracking with Bayesian Estimation of Dynamic Layer Representations
Decomposing video frames into coherent two-dimensional motion layers is a powerful method for representing videos. Such a representation provides an intermediate description that e...
Hai Tao, Harpreet S. Sawhney, Rakesh Kumar