Sciweavers

1295 search results - page 131 / 259
» informs 1998
Sort
View
ICIP
1998
IEEE
16 years 6 months ago
Recovering from Bit Errors in Scalar-Quantized Discrete Wavelet Transformed Images
In this paper we study the e ects of transmission noise on xed-length coded wavelet coe cients. We extend our previous work on maximum a posteriori detectors 1] to include interbi...
Alexander E. Mohr, Eve A. Riskin, Richard E. Ladne...
ICIP
1998
IEEE
16 years 6 months ago
Isophote-based Interpolation
Standard methods for image interpolation are based on smoothly fitting the image intensity surface. Recent edgedirected interpolation methods add limited geometric information (ed...
Bryan S. Morse, Duane Schwartzwald
ICIP
1998
IEEE
16 years 6 months ago
Adaptive Key Frame Extraction using Unsupervised Clustering
Key frame extraction has been recognized as one of the important research issues in video information retrieval. Although progress has been made in key frame extraction, the exist...
Yueting Zhuang, Yong Rui, Thomas S. Huang, Sharad ...
CHI
2008
ACM
16 years 4 months ago
The Georgia Tech aware home
The Aware Home Research Initiative (AHRI) at Georgia Tech is devoted to the multidisciplinary exploration of emerging technologies and services based in the home. Starting in 1998...
Julie A. Kientz, Shwetak N. Patel, Brian Jones, Ed...
AVBPA
2005
Springer
275views Biometrics» more  AVBPA 2005»
15 years 10 months ago
Vulnerabilities in Biometric Encryption Systems
Abstract. The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with a biometric image from the enroled perso...
Andy Adler