Sciweavers

5647 search results - page 1031 / 1130
» A word from the editor
Sort
View
ICIP
2006
IEEE
15 years 12 months ago
Backward Channel Aware Wyner-Ziv Video Coding
Wyner-Ziv video coding is a coding method that exploits source statistics at the decoder. Many Wyner-Ziv video coding schemes encode a video sequence into two types of frames, key...
Limin Liu, Zhen Li, Edward J. Delp
ICPR
2000
IEEE
15 years 11 months ago
Piecewise Linear Skeletonization Using Principal Curves
We propose an algorithm to find piecewise linear skeletons of hand-written characters by using principal curves. The development of the method was inspired by the apparent similar...
Adam Krzyzak, Balázs Kégl
ICPR
2000
IEEE
15 years 11 months ago
Snakes and Spiders
We consider di usion processes on a class of R trees. The processes are de ned in a manner similar to that of Le Gall's Brownian snake. Each point in the tree has a real value...
Brendan McCane
90
Voted
SIGSOFT
2007
ACM
15 years 11 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
WWW
2008
ACM
15 years 11 months ago
Graph theoretical framework for simultaneously integrating visual and textual features for efficient web image clustering
With the explosive growth of Web and the recent development in digital media technology, the number of images on the Web has grown tremendously. Consequently, Web image clustering...
Manjeet Rege, Ming Dong, Jing Hua
« Prev « First page 1031 / 1130 Last » Next »