Sciweavers

1242 search results - page 236 / 249
» Digital Objects as Passwords
Sort
View
KDD
2010
ACM
245views Data Mining» more  KDD 2010»
15 years 1 months ago
Flexible constrained spectral clustering
Constrained clustering has been well-studied for algorithms like K-means and hierarchical agglomerative clustering. However, how to encode constraints into spectral clustering rem...
Xiang Wang, Ian Davidson
CIVR
2010
Springer
427views Image Analysis» more  CIVR 2010»
15 years 29 days ago
An efficient method for face retrieval from large video datasets
The human face is one of the most important objects in videos since it provides rich information for spotting certain people of interest, such as government leaders in news video,...
Thao Ngoc Nguyen, Thanh Duc Ngo, Duy-Dinh Le, Shin...
BMVC
2001
15 years 1 days ago
Hue that is invariant to brightness and gamma
Hue provides a useful and intuitive cue that is used in a variety of computer vision applications. Hue is an attractive feature as it captures intrinsic information about the colo...
Graham D. Finlayson, Gerald Schaefer
ACMICEC
2008
ACM
195views ECommerce» more  ACMICEC 2008»
14 years 11 months ago
DRM domain authentication using electronic payment systems
This paper focuses on the problem of how to allow sharing of copyrighted content between a set of authorised devices and preventing unauthoried copying of content to other devices...
Imad M. Abbadi, Muntaha Alawneh
CANDC
2005
ACM
14 years 11 months ago
Computational schemes for biomimetic sculpture
A prototype system for the automatic evolution of biomimetic structures using structural automata is described and its utility for generating digital sculpture is demonstrated. Sc...
Brower Hatcher, Karl Aspelund, Andrew R. Willis, J...