Sciweavers

22 search results - page 4 / 5
» amr 2005
Sort
View
AMR
2005
Springer
100views Multimedia» more  AMR 2005»
13 years 11 months ago
Using Segmented Objects in Ostensive Video Shot Retrieval
This paper presents a system for video shot retrieval in which shots are retrieved based on matching video objects using a combination of colour, shape and texture. Rather than mat...
Sorin Sav, Hyowon Lee, Alan F. Smeaton, Noel E. O'...
VLDB
2005
ACM
125views Database» more  VLDB 2005»
13 years 11 months ago
Using Association Rules for Fraud Detection in Web Advertising Networks
Discovering associations between elements occurring in a stream is applicable in numerous applications, including predictive caching and fraud detection. These applications requir...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
13 years 11 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
WWW
2005
ACM
14 years 6 months ago
Duplicate detection in click streams
We consider the problem of finding duplicates in data streams. Duplicate detection in data streams is utilized in various applications including fraud detection. We develop a solu...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
13 years 11 months ago
Optimization of source and channel coding for voice over IP
Voice over Internet Protocol (VoIP) applications must typically choose a tradeoff between the bits allocated for Forward Error Correcting (FEC) and that for the source coding to a...
Yicheng Huang, Jari Korhonen, Ye Wang