Sciweavers

6103 search results - page 778 / 1221
» Multimedia Retrieval Algorithmics
Sort
View
CHES
2007
Springer
110views Cryptology» more  CHES 2007»
15 years 10 months ago
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...
CGI
2006
IEEE
15 years 10 months ago
An Efficient Keyframe Extraction from Motion Capture Data
This paper proposes a keyframe extraction method based on a novel layered curve simplification algorithm for motion capture data. Bone angles are employed as motion features and ke...
Jun Xiao, Yueting Zhuang, Tao Yang, Fei Wu
FIRBPERF
2005
IEEE
260views Algorithms» more  FIRBPERF 2005»
15 years 10 months ago
Models of Dynamic Web Content
Web pages are created, modified and removed at unspecified times by their owners. The frequency and extent of changes to Web pages vary across sites and across pages within site...
Mariacarla Calzarossa, Daniele Tessera
SIBGRAPI
2005
IEEE
15 years 10 months ago
Background Subtraction and Shadow Detection in Grayscale Video Sequences
Tracking moving objects in video sequence is an important problem in computer vision, with applications several fields, such as video surveillance and target tracking. Most techn...
Julio Cezar Silveira Jacques Jr., Cláudio R...
SIGIR
2005
ACM
15 years 10 months ago
Relation between PLSA and NMF and implications
Non-negative Matrix Factorization (NMF, [5]) and Probabilistic Latent Semantic Analysis (PLSA, [4]) have been successfully applied to a number of text analysis tasks such as docum...
Éric Gaussier, Cyril Goutte