Sciweavers

4810 search results - page 937 / 962
» Modeling Value Speculation
Sort
View
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
14 years 11 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
UAI
2003
14 years 11 months ago
On the Convergence of Bound Optimization Algorithms
Many practitioners who use EM and related algorithms complain that they are sometimes slow. When does this happen, and what can be done about it? In this paper, we study the gener...
Ruslan Salakhutdinov, Sam T. Roweis, Zoubin Ghahra...
VCIP
2003
148views Communications» more  VCIP 2003»
14 years 11 months ago
Semantic transcoding of video based on regions of interest
Traditional transcoding on multimedia has been performed from the perspectives of user terminal capabilities such as display sizes and decoding processing power, and network resou...
Jeongyeon Lim, Munchurl Kim, Jong-Nam Kim, Kyeongs...
ECIS
2000
14 years 11 months ago
The Learning Administration - Shaping Change and Taking Off into the Future
- E-services will change the future of business as well as private relationships. The rearrangement of value chains, new competitive arenas and the growing necessity and interest i...
Hans-Jörg Bullinger, Werner Brettreich-Teichm...
RIAO
2000
14 years 11 months ago
Speaker change detection using joint audio-visual statistics
In this paper, we present an approach for speaker change detection in broadcast video using joint audio-visual scene change statistics. Our experiments indicate that using joint a...
Giridharan Iyengar, Chalapathy Neti, Sankar Basu