Sciweavers

3570 search results - page 657 / 714
» A User Model for Information Erasure
Sort
View
ICDE
2006
IEEE
201views Database» more  ICDE 2006»
15 years 5 months ago
Content and Context Aware Networking Using Semantic Tagging
Today’s model of networking primarily concentrates intelligence at the end hosts with the network itself offering a simple“best-effort”,“data agnostic” communication med...
Sethuram Balaji Kodeswaran, Anupam Joshi
ICMCS
2006
IEEE
118views Multimedia» more  ICMCS 2006»
15 years 5 months ago
Spread-Spectrum Substitution watermarking Game
In the integrity checking context of multimedia contents, a malicious user aims at devising a forged content in order to fool a watermarker by making him use as a genuine content....
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
IROS
2006
IEEE
209views Robotics» more  IROS 2006»
15 years 5 months ago
A Toolbox for Easily Calibrating Omnidirectional Cameras
- In this paper, we present a novel technique for calibrating central omnidirectional cameras. The proposed procedure is very fast and completely automatic, as the user is only ask...
Davide Scaramuzza, Agostino Martinelli, Roland Sie...
CVPR
2005
IEEE
15 years 4 months ago
Audio-Visual Affect Recognition through Multi-Stream Fused HMM for HCI
Advances in computer processing power and emerging algorithms are allowing new ways of envisioning Human Computer Interaction. This paper focuses on the development of a computing...
Zhihong Zeng, Jilin Tu, Brian Pianfetti, Ming Liu,...
ICDM
2005
IEEE
190views Data Mining» more  ICDM 2005»
15 years 4 months ago
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
Jimeng Sun, Huiming Qu, Deepayan Chakrabarti, Chri...