Sciweavers

1997 search results - page 333 / 400
» A Model for Data Leakage Detection
Sort
View
TIP
2010
107views more  TIP 2010»
14 years 6 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
CVPR
2007
IEEE
16 years 1 months ago
A Bio-inspired Learning Approach for the Classification of Risk Zones in a Smart Space
Learning from experience is a basic task of human brain that is not yet fulfilled satisfactorily by computers. Therefore, in recent years to cope with this issue, bio-inspired app...
Alessio Dore, Matteo Pinasco, Carlo S. Regazzoni
ECCV
2002
Springer
16 years 1 months ago
Fusion of Multiple Tracking Algorithms for Robust People Tracking
This paper shows how the output of a number of detection and tracking algorithms can be fused to achieve robust tracking of people in an indoor environment. The new tracking system...
Nils T. Siebel, Stephen J. Maybank
ISBI
2008
IEEE
16 years 17 days ago
Blind deconvolution for diffraction-limited fluorescence microscopy
Optical Sections of biological samples obtained from a fluorescence Confocal Laser Scanning Microscopes (CLSM) are often degraded by out-of-focus blur and photon counting noise. S...
Praveen Pankajakshan, Bo Zhang, Laure Blanc-F&eacu...
RECOMB
2009
Springer
16 years 14 days ago
Haplotype Inference in Complex Pedigrees
Abstract. Despite the desirable information contained in complex pedigree datasets, analysis methods struggle to efficiently process these datasets. The attractiveness of pedigree ...
Bonnie Kirkpatrick, Javier Rosa, Eran Halperin, Ri...