Sciweavers

6906 search results - page 28 / 1382
» An algorithm for modelling key terms
Sort
View
98
Voted
CCS
2007
ACM
15 years 3 months ago
Robust group key agreement using short broadcasts
A group key agreement protocol (GKA) allows a set of players to establish a shared secret key which can be used to secure a subsequent communication. Several efficient constantrou...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
81
Voted
IWSEC
2007
Springer
15 years 3 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
ISMIR
2004
Springer
115views Music» more  ISMIR 2004»
15 years 3 months ago
Musical key extraction from audio
The realisation and evaluation of a musical key extraction algorithm that works directly on raw audio data is presented. Its implementation is based on models of human auditory pe...
Steffen Pauws
ICMCS
2006
IEEE
142views Multimedia» more  ICMCS 2006»
15 years 3 months ago
Key Frame Extraction in 3D Video by Rate-Distortion Optimization
3D video, which consists of a sequence of 3D mesh models, can provide detailed 3D information both in spatial and temporal domain. In this paper, a key frame extraction method has...
Jianfeng Xu, Toshihiko Yamasaki, Kiyoharu Aizawa
ECIR
2007
Springer
14 years 11 months ago
Hierarchical Browsing of Video Key Frames
We propose an innovative, general purpose, method to the selection and hierarchical representation of key frames of a video sequence for video summarization. It is able to create a...
Gianluigi Ciocca, Raimondo Schettini