Sciweavers

569 search results - page 81 / 114
» An efficient clustering method for k-anonymization
Sort
View
CLUSTER
2003
IEEE
14 years 1 months ago
HPCM: A Pre-Compiler Aided Middleware for the Mobility of Legacy Code
Mobility is a fundamental functionality of the next generation internet computing. How to support mobility for legacy codes, however, is still an issue of research. The key to sol...
Cong Du, Xian-He Sun, Kasidit Chanchio
CONEXT
2006
ACM
14 years 11 days ago
Early application identification
The automatic detection of applications associated with network traffic is an essential step for network security and traffic engineering. Unfortunately, simple port-based classif...
Laurent Bernaille, Renata Teixeira, Kavé Sa...
CORR
2002
Springer
123views Education» more  CORR 2002»
13 years 8 months ago
Survey propagation: an algorithm for satisfiability
: We study the satisfiability of randomly generated formulas formed by M clauses of exactly K literals over N Boolean variables. For a given value of N the problem is known to be m...
Alfredo Braunstein, Marc Mézard, Riccardo Z...
SIGMOD
2005
ACM
178views Database» more  SIGMOD 2005»
14 years 8 months ago
Towards Effective Indexing for Very Large Video Sequence Database
With rapid advances in video processing technologies and ever fast increments in network bandwidth, the popularity of video content publishing and sharing has made similarity sear...
Heng Tao Shen, Beng Chin Ooi, Xiaofang Zhou
CVPR
2004
IEEE
14 years 10 months ago
Video Data Mining Using Configurations of Viewpoint Invariant Regions
We describe a method for obtaining the principal objects, characters and scenes in a video by measuring the reoccurrence of spatial configurations of viewpoint invariant features....
Josef Sivic, Andrew Zisserman