Sciweavers

6315 search results - page 1077 / 1263
» Approximating Solution Structure
Sort
View
101
Voted
ICMCS
2007
IEEE
130views Multimedia» more  ICMCS 2007»
15 years 9 months ago
Mining Information of Attack-Defense Status from Soccer Video Based on Scene Analysis
Video Content is always huge by itself with abundant information. Extracting explicit semantic information has been extensively investigated such as object detection, structure an...
Shuqiang Jiang, Qingming Huang, Wen Gao
122
Voted
IJCNN
2007
IEEE
15 years 9 months ago
An Associative Memory for Association Rule Mining
— Association Rule Mining is a thoroughly studied problem in Data Mining. Its solution has been aimed for by approaches based on different strategies involving, for instance, the...
Vicente O. Baez-Monroy, Simon O'Keefe
104
Voted
IPPS
2007
IEEE
15 years 9 months ago
Porting the GROMACS Molecular Dynamics Code to the Cell Processor
The Cell processor offers substantial computational power which can be effectively utilized only if application design and implementation are tuned to the Cell architecture. In th...
Stephen Olivier, Jan Prins, Jeff Derby, Ken V. Vu
LCN
2007
IEEE
15 years 9 months ago
Towards Stateless Single-Packet IP Traceback
The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes...
Rafael P. Laufer, Pedro B. Velloso, Daniel de Oliv...
148
Voted
SASO
2007
IEEE
15 years 9 months ago
STORM: A Secure Overlay for P2P Reputation Management
A fundamental problem that confronts decentralized reputation systems is the design of efficient, secure and incentive-compatible mechanisms to gather trust information despite m...
Aina Ravoaja, Emmanuelle Anceaume
« Prev « First page 1077 / 1263 Last » Next »