Sciweavers

3072 search results - page 89 / 615
» Shape analysis algorithm based on information theory
Sort
View
ICMCS
1999
IEEE
234views Multimedia» more  ICMCS 1999»
15 years 2 months ago
Spatiotemporal Segmentation and Tracking of Objects for Visualization of Videoconference Image Sequences
Abstract--In this paper, a procedure is described for the segmentation, content-based coding, and visualization of videoconference image sequences. First, image sequence analysis i...
Ioannis Kompatsiaris, Michael G. Strintzis
HICSS
2006
IEEE
118views Biometrics» more  HICSS 2006»
15 years 3 months ago
Information Quality as a Common Ground for Key Players in e-Government Integration and Interoperability
Whereas computer-supported sharing of information is a core issue of e-Government integration and interoperation, the key players involved hardly find any guidance how to settle f...
Ralf Klischewski, Hans Jochen Scholl
IWMM
2011
Springer
217views Hardware» more  IWMM 2011»
14 years 21 days ago
On the theory and potential of LRU-MRU collaborative cache management
The goal of cache management is to maximize data reuse. Collaborative caching provides an interface for software to communicate access information to hardware. In theory, it can o...
Xiaoming Gu, Chen Ding
TMA
2010
Springer
140views Management» more  TMA 2010»
14 years 7 months ago
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory
Abstract. Network traffic classification and anomaly detection have received much attention in the last few years. However, due to the the lack of common ground truth, proposed met...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
CCS
2009
ACM
15 years 4 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...