Sciweavers

2620 search results - page 398 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
EDBT
2004
ACM
187views Database» more  EDBT 2004»
14 years 9 months ago
Hierarchical In-Network Data Aggregation with Quality Guarantees
Earlier work has demonstrated the effectiveness of in-network data aggregation in order to minimize the amount of messages exchanged during continuous queries in large sensor netwo...
Antonios Deligiannakis, Yannis Kotidis, Nick Rouss...
ICDE
2010
IEEE
243views Database» more  ICDE 2010»
14 years 9 months ago
Probabilistic Contextual Skylines
The skyline query returns the most interesting tuples according to a set of explicitly defined preferences among attribute values. This work relaxes this requirement, and allows us...
Anastasios Arvanitis, Dimitris Sacharidis, Timos K...
DCC
2008
IEEE
14 years 8 months ago
Server Placement in Multiple-Description-Based Media Streaming
Multiple description coding (MDC) has emerged as a powerful technique for reliable real-time communications over lossy packet networks. In its basic form, it involves encoding a me...
Satyajeet Ahuja, Marwan Krunz
EUROSYS
2006
ACM
14 years 6 months ago
URICA: Usage-awaRe Interactive Content Adaptation for mobile devices
Usage-awaRe Interactive Content Adaptation (URICA) is an automatic technique that adapts content for display on mobile devices based on usage semantics. URICA allows users who are...
Iqbal Mohomed, Jim Chengming Cai, Eyal de Lara
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 4 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...