Sciweavers

263 search results - page 43 / 53
» Toward best-effort information extraction
Sort
View
MM
2004
ACM
97views Multimedia» more  MM 2004»
14 years 3 months ago
Security of human video objects by incorporating a chaos-based feedback cryptographic scheme
Security of multimedia files attracts more and more attention and many encryption methods have been proposed in literature. However most cryptographic systems deal with multimedia...
Paraskevi K. Tzouveli, Klimis S. Ntalianis, Stefan...
BMCBI
2008
142views more  BMCBI 2008»
13 years 10 months ago
Microarray data mining: A novel optimization-based approach to uncover biologically coherent structures
Background: DNA microarray technology allows for the measurement of genome-wide expression patterns. Within the resultant mass of data lies the problem of analyzing and presenting...
Meng Piao Tan, Erin N. Smith, James R. Broach, Chr...
CVPR
2004
IEEE
15 years 2 days ago
Asymmetrically Boosted HMM for Speech Reading
Speech reading, also known as lip reading, is aimed at extracting visual cues of lip and facial movements to aid in recognition of speech. The main hurdle for speech reading is th...
Pei Yin, Irfan A. Essa, James M. Rehg
CVPR
2007
IEEE
15 years 2 days ago
Large scale vision-based navigation without an accurate global reconstruction
Autonomous cars will likely play an important role in the future. A vision system designed to support outdoor navigation for such vehicles has to deal with large dynamic environme...
Albert Diosi, Anthony Remazeilles, François...
WWW
2009
ACM
14 years 10 months ago
Behavioral profiles for advanced email features
We examine the behavioral patterns of email usage in a large-scale enterprise over a three-month period. In particular, we focus on two main questions: (Q1) what do replies depend...
Thomas Karagiannis, Milan Vojnovic