Learn More
This paper considers the problem of component forensics and proposes a methodology to identify the algorithms and parameters employed by various processing modules inside a digital camera. The proposed analysis techniques are non-intrusive, using only sample output images collected from the camera to find the color filter array pattern; and the algorithm(More)
This paper is concerned with the way information access systems support the question answering process. This process includes three stages: question formulation, information gathering, and analysis and synthesis. Standard information access technologies are mainly concerned with the second of these stages, providing little or no support for the last stage.(More)
Network-embedded FEC (NEF) for overlay and peer-to-peer (p2p) multicast networks was introduced, and the impact of packet loss correlation on the performance of NEF was further analyzed and evaluated. In these previous works, a centralized codec placement algorithm and a greedy optimization algorithm to place a specified number of NEF codecs in a multicast(More)
Scene classification is an important research direction in the computer vision. However, it is not an easy task. We face many serious difficulties and challenges when classifying the nature scenes. A novel approach is proposed to recognize the nature scenes. Based on the traditional Bag of Visual words (BOV) model, the feature field and space field are(More)
  • 1