Sciweavers

1646 search results - page 250 / 330
» fast 2007
Sort
View
ICDM
2007
IEEE
109views Data Mining» more  ICDM 2007»
14 years 3 months ago
A Support Vector Approach to Censored Targets
Censored targets, such as the time to events in survival analysis, can generally be represented by intervals on the real line. In this paper, we propose a novel support vector tec...
Pannagadatta K. Shivaswamy, Wei Chu, Martin Jansch...
ICIP
2007
IEEE
14 years 3 months ago
Complexity Control for Real-Time Video Coding
A methodology for complexity scalable video encoding and complexity control within the framework of the H.264/AVC video encoder is presented. To yield good rate-distortion perform...
Emrah Akyol, Debargha Mukherjee, Yuxin Liu
ICIP
2007
IEEE
14 years 3 months ago
Palmprint Verification using Complex Wavelet Transform
Palmprint is a unique and reliable biometric characteristic with high usability. With the increasing demand of automatic palmprint authentication systems, the development of accur...
Lei Zhang, Zhenhua Guo, Zhou Wang, David Zhang
ICIP
2007
IEEE
14 years 3 months ago
An Image-Based Rendering (IBR) Approach for Realistic Stereo View Synthesis of TV Broadcast Based on Structure from Motion
In the past years, the 3D display technology has become a booming branch of research with fast technical progress. Hence, the 3D conversion of already existing 2D video material i...
Sebastian Knorr, Thomas Sikora
ICMCS
2007
IEEE
136views Multimedia» more  ICMCS 2007»
14 years 3 months ago
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image
Some (k, n)-threshold image secret sharing schemes encrypt the secret image into n noise-like shadow images with size 1/k times that of the original secret image. The small size o...
Ching-Nung Yang, Tse-Shih Chen