Sciweavers

1402 search results - page 269 / 281
» Detecting Change in Data Streams
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding
—The performance of randomized network coding can suffer significantly when malicious nodes corrupt the content of the exchanged blocks. Previous work have introduced error corr...
Elias Kehdi, Baochun Li
MM
2009
ACM
209views Multimedia» more  MM 2009»
14 years 2 months ago
Brain state decoding for rapid image retrieval
Human visual perception is able to recognize a wide range of targets under challenging conditions, but has limited throughput. Machine vision and automatic content analytics can p...
Jun Wang, Eric Pohlmeyer, Barbara Hanna, Yu-Gang J...
ACIVS
2007
Springer
14 years 1 months ago
Spatiotemporal Fusion Framework for Multi-camera Face Orientation Analysis
In this paper, we propose a collaborative technique for face orientation estimation in smart camera networks. The proposed spatiotemporal feature fusion analysis is based on active...
Chung-Ching Chang, Hamid K. Aghajan
LOCA
2007
Springer
14 years 1 months ago
SocialMotion: Measuring the Hidden Social Life of a Building
In this paper we present an approach to analyzing the social behaviors that occur in a typical office space. We describe a system consisting of over 200 motion sensors connected ...
Christopher Richard Wren, Yuri A. Ivanov, Ishwinde...
ISPASS
2005
IEEE
14 years 1 months ago
Reaping the Benefit of Temporal Silence to Improve Communication Performance
Communication misses--those serviced by dirty data in remote caches--are a pressing performance limiter in shared-memory multiprocessors. Recent research has indicated that tempor...
Kevin M. Lepak, Mikko H. Lipasti