Sciweavers

8177 search results - page 1409 / 1636
» Detecting System Emulators
Sort
View
ICIP
2000
IEEE
16 years 5 months ago
Integrating Visual, Audio and Text Analysis for News Video
In this paper, we present a system developed for content-based broadcasted news video browsing for home users. There are three main factors that distinguish our work from other si...
Wei Qi, Lie Gu, Hao Jiang, Xiang-Rong Chen, HongJi...
ICIP
1999
IEEE
16 years 5 months ago
3D Voxel Construction Based on Epipolar Geometry
In this paper, we propose an approach for construction of a projective 3D voxel space based on epipolar geometry obtained with weak calibration. This concept of voxel space define...
Makoto Kimura, Hideo Saito, Takeo Kanade
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 5 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
ICDE
2007
IEEE
117views Database» more  ICDE 2007»
16 years 5 months ago
Cost-Conscious Cleaning of Massive RFID Data Sets
Efficient and accurate data cleaning is an essential task for the successful deployment of RFID systems. Although important advances have been made in tag detection rates, it is s...
Hector Gonzalez, Jiawei Han, Xuehua Shen
ICDE
2007
IEEE
206views Database» more  ICDE 2007»
16 years 5 months ago
Efficiently Processing Continuous k-NN Queries on Data Streams
Efficiently processing continuous k-nearest neighbor queries on data streams is important in many application domains, e. g. for network intrusion detection or in querysubscriber ...
Beng Chin Ooi, Christian Böhm, Claudia Plant,...
« Prev « First page 1409 / 1636 Last » Next »