Sciweavers

15792 search results - page 2965 / 3159
» Computational Abstraction Steps
Sort
View
SIBGRAPI
2009
IEEE
15 years 11 months ago
Nude Detection in Video Using Bag-of-Visual-Features
Abstract—The ability to filter improper content from multimedia sources based on visual content has important applications, since text-based filters are clearly insufficient a...
Ana Paula Brandão Lopes, Sandra E. F. de Av...
ICDM
2009
IEEE
126views Data Mining» more  ICDM 2009»
15 years 11 months ago
Convex Non-negative Matrix Factorization in the Wild
Abstract—Non-negative matrix factorization (NMF) has recently received a lot of attention in data mining, information retrieval, and computer vision. It factorizes a non-negative...
Christian Thurau, Kristian Kersting, Christian Bau...
ICPP
2009
IEEE
15 years 11 months ago
On Maximum Stability with Enhanced Scalability in High-Churn DHT Deployment
Abstract—When applied in a commercial deployment, DHTbased P2P protocols face a dilemma: although most real-world participants are so unstable that the maintenance overhead is pr...
Junfeng Xie, Zhenhua Li, Guihai Chen, Jie Wu
INFOCOM
2009
IEEE
15 years 11 months ago
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
Abstract—It is challenging to provide authentication to timecritical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only effi...
Qiyan Wang, Himanshu Khurana, Ying Huang, Klara Na...
IPPS
2009
IEEE
15 years 11 months ago
Network awareness of P2P live streaming applications
Abstract—Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about ...
Delia Ciullo, M.-A. Garcia da Rocha Neta, Á...
« Prev « First page 2965 / 3159 Last » Next »