Sciweavers

1474 search results - page 140 / 295
» Exploiting Locality in a TMS
Sort
View
ISMIR
2005
Springer
137views Music» more  ISMIR 2005»
15 years 10 months ago
Extracting Quality Parameters for Compressed Audio from Fingerprints
An audio fingerprint is a compact yet very robust representation of the perceptually relevant parts of audio content. It can be used to identify audio, even when of severely dist...
Peter Jan O. Doets, Reginald L. Lagendijk
IWDW
2005
Springer
15 years 10 months ago
Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect
Image-Adaptive watermarking systems exploit visual models to adapt the watermark to local properties of the host image. This leads to a watermark power enhancement, hence an improv...
Amir Houman Sadr, Shahrokh Ghaemmaghami
MLDM
2005
Springer
15 years 10 months ago
An Automatic Face Recognition System in the Near Infrared Spectrum
Face recognition is a challenging visual classification task, especially when the lighting conditions can not be controlled. In this paper, we present an automatic face recognitio...
Shuyan Zhao, Rolf-Rainer Grigat
NETGAMES
2004
ACM
15 years 9 months ago
Scalable peer-to-peer networked virtual environment
We propose a fully-distributed peer-to-peer architecture to solve the scalability problem of Networked Virtual Environment in a simple and efficient manner. Our method exploits lo...
Shun-Yun Hu, Guan-Ming Liao
SACMAT
2004
ACM
15 years 9 months ago
Towards a credential-based implementation of compound access control policies
We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using ...
Joachim Biskup, Sandra Wortmann