Sciweavers

5344 search results - page 430 / 1069
» Privacy-Preserving Set Operations
Sort
View
118
Voted
HICSS
2008
IEEE
86views Biometrics» more  HICSS 2008»
15 years 11 months ago
Overcoming Impediments to Cell Phone Forensics
: Cell phones are an emerging but rapidly growing area of computer forensics. While cell phones are becoming more like desktop computers functionally, their organization and operat...
Wayne Jansen, Aurélien Delaitre, Ludovic Mo...
ICASSP
2008
IEEE
15 years 11 months ago
Incremental salient point detection
In this paper, we investigate an approach that computes salient points, i.e. areas of natural images that contain corners or edges, incrementally. We focus on the popular Harris c...
Ioannis Patras, Yiannis Andreopoulos
ICASSP
2008
IEEE
15 years 11 months ago
Blind optimization of algorithm parameters for signal denoising by Monte-Carlo SURE
We consider the problem of optimizing the parameters of an arbitrary denoising algorithm by minimizing Stein’s Unbiased Risk Estimate (SURE) which provides a means of assessing ...
Sathish Ramani, Thierry Blu, Michael Unser
ICDCS
2008
IEEE
15 years 11 months ago
stdchk: A Checkpoint Storage System for Desktop Grid Computing
— Checkpointing is an indispensable technique to provide fault tolerance for long-running high-throughput applications like those running on desktop grids. This paper argues that...
Samer Al-Kiswany, Matei Ripeanu, Sudharshan S. Vaz...
ICIP
2008
IEEE
15 years 11 months ago
A systematic study of the role of context on image classification
We present the results of a systematic study of the contextual gain hypothesis for image classification. This hypothesis relates the traditional strategy of direct visual classi...
Nikhil Rasiwasia, Nuno Vasconcelos