Sciweavers

297 search results - page 56 / 60
» chi 2004
Sort
View
ICISC
2004
146views Cryptology» more  ICISC 2004»
14 years 11 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
EEE
2004
IEEE
15 years 2 months ago
Mining Traveling and Purchasing Behaviors of Customers in Electronic Commerce Environment
Web usage mining is the process of extracting interesting patterns from web logs. This paper proposes an IPA (Integrating Path traversal patterns and Association rules) model for ...
Yue-Shi Lee, Show-Jane Yen, Ghi-Hua Tu, Min-Chi Hs...
CVPR
2004
IEEE
16 years 13 days ago
Video Repairing: Inference of Foreground and Background under Severe Occlusion
In this paper, we propose a new method, video repairing, to robustly infer missing static background and moving foreground due to severe damage or occlusion from a video. To recov...
Jiaya Jia, Tai-Pang Wu, Yu-Wing Tai, Chi-Keung Tan...
ECCV
2004
Springer
16 years 9 days ago
Face Recognition with Local Binary Patterns
In this work, we present a novel approach to face recognition which considers both shape and texture information to represent face images. The face area is first divided into small...
Abdenour Hadid, Matti Pietikäinen, Timo Ahone...
ECCV
2004
Springer
16 years 9 days ago
Bayesian Correction of Image Intensity with Spatial Consideration
Abstract. Under dimly lit condition, it is difficult to take a satisfactory image in long exposure time with a hand-held camera. Despite the use of a tripod, moving objects in the ...
Jiaya Jia, Jian Sun, Chi-Keung Tang, Heung-Yeung S...