Sciweavers

24680 search results - page 4562 / 4936
» Learning
Sort
View
ICITS
2009
15 years 1 months ago
Survey: Leakage Resilience and the Bounded Retrieval Model
Abstract. This survey paper studies recent advances in the field of LeakageResilient Cryptography. This booming area is concerned with the design of cryptographic primitives resist...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
ICMCS
2009
IEEE
185views Multimedia» more  ICMCS 2009»
15 years 1 months ago
Connecting content to community in social media via image content, user tags and user communication
In this paper we develop a recommendation framework to connect image content with communities in online social media. The problem is important because users are looking for useful...
Munmun De Choudhury, Hari Sundaram, Yu-Ru Lin, Aji...
ICMCS
2009
IEEE
131views Multimedia» more  ICMCS 2009»
15 years 1 months ago
Web image mining using concept sensitive Markov stationary features
With the explosive growth of web resources, how to mine semantically relevant images efficiently becomes a challenging and necessary task. In this paper, we propose a concept sens...
Chunjie Zhang, Jing Liu, Hanqing Lu, Songde Ma
ICMCS
2009
IEEE
137views Multimedia» more  ICMCS 2009»
15 years 1 months ago
Fractional compensation for spatial scalable video coding
This paper proposes a novel fractional compensation approach for spatial scalable video coding. It simultaneously exploits inter layer correlation and intra layer correlation by l...
Xiaoyan Sun, Feng Wu
157
Voted
ICMCS
2009
IEEE
153views Multimedia» more  ICMCS 2009»
15 years 1 months ago
Audio-visual privacy protection for video conference
Group video-conferencing systems are routinely used in major corporations, hospitals and universities for meetings, tele-medicine and distance learning among participants from very...
M. Vijay Venkatesh, Jian Zhao, L. Profitt, Sen-Chi...
« Prev « First page 4562 / 4936 Last » Next »