Sciweavers

37 search results - page 6 / 8
» Segmentation with Invisible Keying Signal
Sort
View
ICASSP
2010
IEEE
13 years 7 months ago
Low-latency online speaker tracking on the AMI Corpus of meeting conversations
Ambient Inteligence aims to create smart spaces providing services in a transparent and non-intrusive fashion, so context awareness and user adaptation are key issues. Speech can ...
Maider Zamalloa, Luis Javier Rodríguez-Fuen...
WWW
2009
ACM
14 years 12 hour ago
Extracting data records from the web using tag path clustering
Fully automatic methods that extract lists of objects from the Web have been studied extensively. Record extraction, the first step of this object extraction process, identifies...
Gengxin Miao, Jun'ichi Tatemura, Wang-Pin Hsiung, ...
ICIP
1999
IEEE
14 years 9 months ago
Data Embedding in Text for a Copier System
In this paper, we present a scheme for embedding data in copies (color or monochrome) of predominantly text pages that may also contain color images or graphics. Embedding data im...
Anoop K. Bhattacharjya, Hakan Ancin
CSREASAM
2003
13 years 8 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
DAGM
2008
Springer
13 years 9 months ago
Convex Hodge Decomposition of Image Flows
The total variation (TV) measure is a key concept in the field of variational image analysis. Introduced by Rudin, Osher and Fatemi in connection with image denoising, it also prov...
Jing Yuan, Gabriele Steidl, Christoph Schnörr