Sciweavers

14824 search results - page 2553 / 2965
» Security - Introduction
Sort
View
ICMCS
2006
IEEE
116views Multimedia» more  ICMCS 2006»
15 years 10 months ago
SIKAS: A Scalable Distributed Key Management Scheme for Dynamic Collaborative Groups
The increasing popularity of distributed and collaborative applications prompts the need for secure communication in collaborative groups. Some distributed collaborative key manag...
Jiang Zhang, Jian-Guang Luo, Bin Li, Shiqiang Yang
ICMCS
2006
IEEE
371views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Automatic Counting of Interacting People by using a Single Uncalibrated Camera
Automatic counting of people, entering or exiting a region of interest, is very important for both business and security applications. This paper introduces an automatic and robus...
Senem Velipasalar, Ying-li Tian, Arun Hampapur
ICMCS
2006
IEEE
105views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Embedded Convolutional Face Finder
In this paper, a high-level optimization methodology is applied for the implementation of the well-known Convolutional Face Finder (CFF) algorithm for real-time applications on ce...
Sébastien Roux, Franck Mamalet, Christophe ...
ICMCS
2006
IEEE
112views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Where was the Picture Taken: Image Localization in Route Panoramas Using Epipolar Geometry
Finding the location where a picture was taken is an important problem for a variety of applications including surveying, interactive traveling and homeland security among others....
Saad M. Khan, Fahd Rafi, Mubarak Shah
ICMCS
2006
IEEE
130views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Video Analysis and Compression on the STI Cell Broadband Engine Processor
With increased concern for physical security, video surveillance is becoming an important business area. Similar camera-based system can also be used in such diverse applications ...
Lurng-Kuo Liu, Sreeni Kesavarapu, Jonathan Connell...
« Prev « First page 2553 / 2965 Last » Next »