Sciweavers

3735 search results - page 618 / 747
» Order compression schemes
Sort
View
89
Voted
KES
2005
Springer
15 years 6 months ago
A Preliminary Design for a Privacy-Friendly Free P2P Media File Distribution System
In most P2P business models, in which users purchase the media, it is necessary to securely identify the user in order to facilitate payment. In this paper, we present a technique ...
Ron G. van Schyndel
PCM
2005
Springer
157views Multimedia» more  PCM 2005»
15 years 6 months ago
Segmentation of the Liver Using the Deformable Contour Method on CT Images
Abstract. Automatic liver segmentation from abdominal computed tomography (CT) images is one of the most important steps for computeraided diagnosis (CAD) for liver CT. However, th...
Seong-Jae Lim, Yong-Yeon Jeong, Yo-Sung Ho
VLDB
2005
ACM
129views Database» more  VLDB 2005»
15 years 6 months ago
Sketching Streams Through the Net: Distributed Approximate Query Tracking
Emerging large-scale monitoring applications require continuous tracking of complex dataanalysis queries over collections of physicallydistributed streams. Effective solutions hav...
Graham Cormode, Minos N. Garofalakis
VLSM
2005
Springer
15 years 6 months ago
Denoising Tensors via Lie Group Flows
The need to regularize tensor fields arise recently in various applications. We treat in this paper tensors that belong to matrix Lie groups. We formulate the problem of these SO(...
Yaniv Gur, Nir A. Sochen
SAC
2004
ACM
15 years 6 months ago
Trust enhanced ubiquitous payment without too much privacy loss
Computational models of trust have been proposed for use in ubicomp environments for deciding whether to allow customers to pay with an e-purse or not. In order to build trust in ...
Jean-Marc Seigneur, Christian Damsgaard Jensen