Sciweavers

3343 search results - page 502 / 669
» Network Objects
Sort
View

Publication
262views
16 years 6 months ago
Attribute Multiset Grammars for Global Explanations of Activities
Recognizing multiple interleaved activities in a video requires implicitly partitioning the detections for each activity. Furthermore, constraints between activities are important ...
Dima Damen, David Hogg
128
Voted
ICIP
2004
IEEE
16 years 3 months ago
A public-key authentication watermarking for binary images
Authentication watermarking is the process that inserts hidden data into an object (image) in order to detect any fraudulent alteration perpetrated by a malicious hacker. In the l...
Hae Yong Kim, Ricardo L. de Queiroz
108
Voted
ICIP
2002
IEEE
16 years 3 months ago
A recursive shape error concealment algorithm
The encoding of shape information is a distinguishing feature of MPEG-4. In error prone communication networks, it is important and efficient to conceal shape errors spatially, so...
Guido M. Schuster, Xiaohuan Li, Aggelos K. Katsagg...
ICIP
1999
IEEE
16 years 3 months ago
Roc Curves for Performance Evaluation of Video Sequences Processing Systems for Surveillance Applications
Performances evaluation of image processing intermediate results in video based surveillance systems is extremely important due to the variety of approaches to this task. In this ...
Franco Oberti, Andrea Teschioni, Carlo S. Regazzon...
ICDE
2004
IEEE
124views Database» more  ICDE 2004»
16 years 3 months ago
Authenticating Query Results in Edge Computing
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not nec...
HweeHwa Pang, Kian-Lee Tan