Sciweavers

208 search results - page 21 / 42
» Variationally universal hashing
Sort
View
CVPR
2009
IEEE
16 years 4 months ago
Discriminative Subvolume Search for Efficient Action Detection
Actions are spatio-temporal patterns which can be characterized by collections of spatio-temporal invariant features. Detection of actions is to find the re-occurrences (e.g. th...
Junsong Yuan (Northwestern University), Zicheng Li...
ICASSP
2010
IEEE
14 years 9 months ago
Audio fingerprinting to identify multiple videos of an event
The proliferation of consumer recording devices and video sharing websites makes the possibility of having access to multiple recordings of the same occurrence increasingly likely...
Courtenay V. Cotton, Daniel P. W. Ellis
IS
2002
14 years 9 months ago
Signature-based structures for objects with set-valued attributes
Aiming at the efficient retrieval of objects with set-valued attributes, we introduce three variations of a new method in order to satisfy subset and superset queries. Our approac...
Eleni Tousidou, Panayiotis Bozanis, Yannis Manolop...
TWC
2008
176views more  TWC 2008»
14 years 9 months ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 3 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy