Sciweavers

18374 search results - page 3557 / 3675
» Applications for data hiding
Sort
View
GW
2005
Springer
113views Biometrics» more  GW 2005»
14 years 3 months ago
Some Experiments in the Gestural Control of Synthesized Sonic Textures
Abstract. In this paper, we introduce some exploratory ideas and applications involving the gestural control of sonic textures. Three examples of how the gestural control of synthe...
Daniel Arfib, Jean-Michel Couturier, Jehan-Julien ...
IMC
2004
ACM
14 years 3 months ago
Characterizing the query behavior in peer-to-peer file sharing systems
This paper characterizes the query behavior of peers in a peer-topeer (P2P) file sharing system. In contrast to previous work, which provides various aggregate workload statistics...
Alexander Klemm, Christoph Lindemann, Mary K. Vern...
IMC
2004
ACM
14 years 3 months ago
Characteristics of internet background radiation
Monitoring any portion of the Internet address space reveals incessant activity. This holds even when monitoring traffic sent to unused addresses, which we term “background rad...
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Ver...
IUI
2004
ACM
14 years 3 months ago
An intelligent assistant for interactive workflow composition
Complex applications in many areas, including scientific computations and business-related web services, are created from collections of components to form workflows. In many case...
Jihie Kim, Marc Spraragen, Yolanda Gil
MM
2004
ACM
152views Multimedia» more  MM 2004»
14 years 3 months ago
Manifold-ranking based image retrieval
In this paper, we propose a novel transductive learning framework named manifold-ranking based image retrieval (MRBIR). Given a query image, MRBIR first makes use of a manifold ra...
Jingrui He, Mingjing Li, HongJiang Zhang, Hanghang...
« Prev « First page 3557 / 3675 Last » Next »