Sciweavers

12264 search results - page 2287 / 2453
» Analysis of the rubberband algorithm
Sort
View
SMI
2005
IEEE
15 years 9 months ago
Two-Dimensional Visibility Charts for Continuous Curves
This paper considers computation of visibility for twodimensional shapes whose boundaries are C1 continuous curves. We assume we are given a one-parameter family of candidate view...
Gershon Elber, Robert Sayegh, Gill Barequet, Ralph...
ANCS
2005
ACM
15 years 9 months ago
Segmented hash: an efficient hash table implementation for high performance networking subsystems
Hash tables provide efficient table implementations, achieving O(1), query, insert and delete operations at low loads. However, at moderate or high loads collisions are quite freq...
Sailesh Kumar, Patrick Crowley
129
Voted
MM
2005
ACM
152views Multimedia» more  MM 2005»
15 years 9 months ago
Critical video quality for distributed automated video surveillance
Large-scale distributed video surveillance systems pose new scalability challenges. Due to the large number of video sources in such systems, the amount of bandwidth required to t...
Pavel Korshunov, Wei Tsang Ooi
SAC
2005
ACM
15 years 9 months ago
Automatic learning of text-to-concept mappings exploiting WordNet-like lexical networks
A great jump towards the advent of the Semantic Web will take place when a critical mass of web resources is available for use in a semantic way. This goal can be reached by the c...
Dario Bonino, Fulvio Corno, Federico Pescarmona
SIGCOMM
2005
ACM
15 years 9 months ago
Improving accuracy in end-to-end packet loss measurement
Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active ...
Joel Sommers, Paul Barford, Nick G. Duffield, Amos...
« Prev « First page 2287 / 2453 Last » Next »