Sciweavers

5220 search results - page 961 / 1044
» Changing Persistent Applications
Sort
View
CIVR
2007
Springer
273views Image Analysis» more  CIVR 2007»
15 years 10 months ago
Scalable near identical image and shot detection
This paper proposes and compares two novel schemes for near duplicate image and video-shot detection. The first approach is based on global hierarchical colour histograms, using ...
Ondrej Chum, James Philbin, Michael Isard, Andrew ...
EMSOFT
2007
Springer
15 years 10 months ago
Exploiting non-volatile RAM to enhance flash file system performance
Non-volatile RAM (NVRAM) such as PRAM (Phase-change RAM), FeRAM (Ferroelectric RAM), and MRAM (Magnetoresistive RAM) has characteristics of both non-volatile storage and random ac...
In Hwan Doh, Jongmoo Choi, Donghee Lee, Sam H. Noh
ESORICS
2007
Springer
15 years 10 months ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
GECCO
2007
Springer
162views Optimization» more  GECCO 2007»
15 years 10 months ago
Some novel locality results for the blob code spanning tree representation
The Blob Code is a bijective tree code that represents each tree on n labelled vertices as a string of n − 2 vertex labels. In recent years, several researchers have deployed th...
Tim Paulden, David K. Smith
HUC
2007
Springer
15 years 10 months ago
Users and Batteries: Interactions and Adaptive Energy Management in Mobile Systems
Abstract. Battery lifetime has become one of the top usability concerns of mobile systems. While many endeavors have been devoted to improving battery lifetime, they have fallen sh...
Nilanjan Banerjee, Ahmad Rahmati, Mark D. Corner, ...