Sciweavers

399 search results - page 22 / 80
» aim 2000
Sort
View
ICIP
2000
IEEE
14 years 9 months ago
Robust Image Hashing
Media hashing is an alternative to achieve many applications previously accomplished with watermarking. The major disadvantage of the existing media hashing technologies is their ...
Ramarathnam Venkatesan, S.-M. Koon, Mariusz H. Jak...
ICPR
2000
IEEE
14 years 8 months ago
Structuring Personal Activity Records Based on Attention - Analyzing Videos from Head-Mounted Camera
This paper introduces a novel method for analyzing video records which contain personal activities captured by a head mounted camera. This aims to support the user to retrieve the...
Yuichi Nakamura, Yuichi Ohta, Jun'ya Ohde
CAIP
2005
Springer
121views Image Analysis» more  CAIP 2005»
14 years 1 months ago
Feature Space Reduction for Face Recognition with Dual Linear Discriminant Analysis
Linear Discriminant Analysis (LDA) is widely known feature extraction technique that aims at creating a feature set of enhanced discriminatory power. It was addressed by many resea...
Krzysztof Kucharski, Wladyslaw Skarbek, Miroslaw B...
NAA
2004
Springer
117views Mathematics» more  NAA 2004»
14 years 1 months ago
Parallel Performance of a 3D Elliptic Solver
It was recently shown that block-circulant preconditioners applied to a conjugate gradient method used to solve structured sparse linear systems arising from 2D or 3D elliptic prob...
Ivan Lirkov
ACSAC
2000
IEEE
14 years 2 days ago
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help?
Early IT security evaluation criteria like the TCSEC and the ITSEC suffered much criticism for their lack of coverage of privacy-related requirements. Recent evaluation criteria, ...
Kai Rannenberg, Giovanni Iachello