Sciweavers

2019 search results - page 283 / 404
» Linkage Information Processing In Distribution Estimation Al...
Sort
View
120
Voted
PCI
2005
Springer
15 years 9 months ago
Storing and Locating Mutable Data in Structured Peer-to-Peer Overlay Networks
Structured peer-to-peer overlay networks or Distributed Hash Tables (DHTs) are distributed systems optimized for storage and retrieval of read-only data. In this paper we elaborate...
Antony Chazapis, Nectarios Koziris
153
Voted
TCSV
2002
229views more  TCSV 2002»
15 years 3 months ago
Automatic segmentation of moving objects in video sequences: a region labeling approach
Abstract--The emerging video coding standard MPEG-4 enables various content-based functionalities for multimedia applications. To support such functionalities, as well as to improv...
Yaakov Tsaig, Amir Averbuch
138
Voted
ICIP
2008
IEEE
16 years 5 months ago
Localization of sparse image tampering via random projections
Hashes can be used to provide authentication of multimedia contents. In the case of images, a hash can be used to detect whether the data has been modified in an illegitimate way....
Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tu...
136
Voted
ICIAP
2005
ACM
16 years 3 months ago
3D Surface Reconstruction from Scattered Data Using Moving Least Square Method
This paper presents an efficient implementation of moving least square(MLS) approximation for 3D surface reconstruction. The smoothness of the MLS is mainly determined by the weigh...
Soon-Jeong Ahn, Jaechil Yoo, Byung-Gook Lee, Joon-...
140
Voted
ICIAP
2005
ACM
15 years 9 months ago
Score Selection Techniques for Fingerprint Multi-modal Biometric Authentication
Abstract. Fingerprints are one of the most used biometrics for automatic personal authentication. Unfortunately, it is often difficult to design fingerprint matchers exhibiting th...
Giorgio Giacinto, Fabio Roli, Roberto Tronci