Sciweavers

37 search results - page 6 / 8
» Segmentation with Invisible Keying Signal
Sort
View
65
Voted
ICASSP
2010
IEEE
14 years 11 months ago
Low-latency online speaker tracking on the AMI Corpus of meeting conversations
Ambient Inteligence aims to create smart spaces providing services in a transparent and non-intrusive fashion, so context awareness and user adaptation are key issues. Speech can ...
Maider Zamalloa, Luis Javier Rodríguez-Fuen...
100
Voted
WWW
2009
ACM
15 years 3 months ago
Extracting data records from the web using tag path clustering
Fully automatic methods that extract lists of objects from the Web have been studied extensively. Record extraction, the first step of this object extraction process, identifies...
Gengxin Miao, Jun'ichi Tatemura, Wang-Pin Hsiung, ...
ICIP
1999
IEEE
16 years 19 days ago
Data Embedding in Text for a Copier System
In this paper, we present a scheme for embedding data in copies (color or monochrome) of predominantly text pages that may also contain color images or graphics. Embedding data im...
Anoop K. Bhattacharjya, Hakan Ancin
CSREASAM
2003
15 years 14 days ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
DAGM
2008
Springer
15 years 26 days ago
Convex Hodge Decomposition of Image Flows
The total variation (TV) measure is a key concept in the field of variational image analysis. Introduced by Rudin, Osher and Fatemi in connection with image denoising, it also prov...
Jing Yuan, Gabriele Steidl, Christoph Schnörr