Abstract--In this paper, we describe an object-based video compression scheme based on the derivation and efficient coding of motion boundaries. First, we recursively identify a sm...
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
As mobile applications become more pervasive, the need for assessing their quality, particularly in terms of efficiency (i.e. performance and resource utilisation), increases. Alt...
For an increasing number of modern database applications, efficient support of similarity search becomes an important task. Along with the complexity of the objects such as images...
In recent work, we presented a framework for many-to-many matching of multi-scale feature hierarchies, in which features and their relations were captured in a vertex-labeled, edge...
M. Fatih Demirci, Ali Shokoufandeh, Sven J. Dickin...