Sciweavers

491 search results - page 96 / 99
» An Efficient Distributed PKI for Structured P2P Networks
Sort
View
ICC
2007
IEEE
113views Communications» more  ICC 2007»
14 years 1 months ago
Utility-Aware Resource Allocation for Multi-Stream Overlay Multicast
Abstract - Overlay multicast, which performs topology construction and data relaying in the application layer, has recently emerged as a promising vehicle for data distribution. In...
Ji Xu, Jiangchuan Liu, Hsiao-Hwa Chen, Xiao Chu
ECUMN
2007
Springer
13 years 11 months ago
Characterization of Slice-Based H.264/AVC Encoded Video Traffic
An explicit slice-based mode type selection scheme for use in H.264/AVC has recently been developed, which preserves the coding efficiency of H.264/AVC without requiring any modif...
Astrid Undheim, Yuan Lin, Peder J. Emstad
KDD
2007
ACM
159views Data Mining» more  KDD 2007»
14 years 7 months ago
Constraint-driven clustering
Clustering methods can be either data-driven or need-driven. Data-driven methods intend to discover the true structure of the underlying data while need-driven methods aims at org...
Rong Ge, Martin Ester, Wen Jin, Ian Davidson
TSP
2008
179views more  TSP 2008»
13 years 7 months ago
Estimation in Gaussian Graphical Models Using Tractable Subgraphs: A Walk-Sum Analysis
Graphical models provide a powerful formalism for statistical signal processing. Due to their sophisticated modeling capabilities, they have found applications in a variety of fie...
V. Chandrasekaran, Jason K. Johnson, Alan S. Wills...
IWANN
1997
Springer
13 years 11 months ago
The Pattern Extraction Architecture: A Connectionist Alternative to the Von Neumann Architecture
A detailed connectionist architecture is described which is capable of relating psychological behavior to the functioning of neurons and neurochemicals. The need to be able to bui...
L. Andrew Coward