The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jen-Hao Hsiao: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jen-Hao Hsiao, Cheng-Hung Li, Chih-Yi Chiu, Jenq-Haur Wang, Chu-Song Chen, Lee-Feng Chien
    Effective Content Tracking for Digital Rights Management in Digital Libraries. [Citation Graph (0, 0)][DBLP]
    ECDL, 2006, pp:415-425 [Conf]
  2. Jen-Hao Hsiao, Jenq-Haur Wang, Ming-Syan Chen, Chu-Song Chen, Lee-Feng Chien
    Constructing a Wrapper-Based DRM System for Digital Content Protection in Digital Libraries. [Citation Graph (0, 0)][DBLP]
    ICADL, 2005, pp:375-379 [Conf]
  3. Wei-Min Jeng, Jen-Hao Hsiao
    An Efficient Content Based Image Retrieval System using the Mesh-of-Trees Architecture. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2005, v:21, n:4, pp:797-808 [Journal]
  4. Jen-Hao Hsiao, Chu-Song Chen, Lee-Feng Chien, Ming-Syan Chen
    Image Copy Detection via Grouping in Feature Space Based on Virtual Prior Attacks. [Citation Graph (0, 0)][DBLP]
    ICIP, 2006, pp:1989-1992 [Conf]
  5. Jen-Hao Hsiao, Yu-Zheng Wang
    VCenter: a digital video management system with mobile search service. [Citation Graph (0, 0)][DBLP]
    JCDL, 2007, pp:508- [Conf]
  6. Jen-Hao Hsiao, Chu-Song Chen, Lee-Feng Chien, Ming-Syan Chen
    A New Approach to Image Copy Detection Based on Extended Feature Sets. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2007, v:16, n:8, pp:2069-2079 [Journal]

  7. Intention-focused active reranking for image object retrieval. [Citation Graph (, )][DBLP]


  8. Protecting Digital Library Collections with Collaborative Web Image Copy Detection. [Citation Graph (, )][DBLP]


  9. A Novel Language-Model-Based Approach for Image Object Mining and Re-ranking. [Citation Graph (, )][DBLP]


  10. Visual-word-based duplicate image search with pseudo-relevance feedback. [Citation Graph (, )][DBLP]


  11. Language-model-based detection cascade for efficient classification of image-based spam e-mail. [Citation Graph (, )][DBLP]


Search in 0.014secs, Finished in 0.015secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002