Sciweavers

338 search results - page 68 / 68
» Learning Based Digital Matting
Sort
View
JUCS
2008
156views more  JUCS 2008»
13 years 4 months ago
Efficient k-out-of-n Oblivious Transfer Schemes
Abstract: Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme a...
Cheng-Kang Chu, Wen-Guey Tzeng
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 3 months ago
Scalable similarity search with optimized kernel hashing
Scalable similarity search is the core of many large scale learning or data mining applications. Recently, many research results demonstrate that one promising approach is creatin...
Junfeng He, Wei Liu, Shih-Fu Chang
ICTAI
2010
IEEE
13 years 2 months ago
A Semantic Similarity Language Model to Improve Automatic Image Annotation
In recent years, with the rapid proliferation of digital images, the need to search and retrieve the images accurately, efficiently, and conveniently is becoming more acute. Automa...
Tianxia Gong, Shimiao Li, Chew Lim Tan