Sciweavers

6137 search results - page 1126 / 1228
» Securing Collaborative Applications
Sort
View
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
14 years 2 months ago
Privacy Preserving Nearest Neighbor Search
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privac...
Mark Shaneck, Yongdae Kim, Vipin Kumar
ICMCS
2006
IEEE
147views Multimedia» more  ICMCS 2006»
14 years 2 months ago
A Secret Key Based Multiscale Fragile Watermark in the Wavelet Domain
The distribution of the wavelet coefficients in 2-D discrete wavelet transform (DWT) subspaces can be well described by a Gaussian mixture statistical model. In this paper, a secr...
Hua Yuan, Xiao-Ping Zhang
ICMCS
2006
IEEE
371views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Automatic Counting of Interacting People by using a Single Uncalibrated Camera
Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. This paper introduces an automatic and robus...
Senem Velipasalar, Ying-li Tian, Arun Hampapur
ICMCS
2006
IEEE
105views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Embedded Convolutional Face Finder
In this paper, a high-level optimization methodology is applied for the implementation of the well-known Convolutional Face Finder (CFF) algorithm for real-time applications on ce...
Sébastien Roux, Franck Mamalet, Christophe ...
ICMCS
2006
IEEE
112views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Where was the Picture Taken: Image Localization in Route Panoramas Using Epipolar Geometry
Finding the location where a picture was taken is an important problem for a variety of applications including surveying, interactive traveling and homeland security among others....
Saad M. Khan, Fahd Rafi, Mubarak Shah
« Prev « First page 1126 / 1228 Last » Next »