Sciweavers

650 search results - page 126 / 130
» Distorting symmetric designs
Sort
View
VEE
2012
ACM
218views Virtualization» more  VEE 2012»
12 years 3 months ago
Enhancing TCP throughput of highly available virtual machines via speculative communication
Checkpoint-recovery based virtual machine (VM) replication is an attractive technique for accommodating VM installations with high-availability. It provides seamless failover for ...
Balazs Gerofi, Yutaka Ishikawa
CVPR
2008
IEEE
14 years 9 months ago
Robust 3D face recognition in uncontrolled environments
Most current 3D face recognition algorithms are designed based on the data collected in controlled situations, which leads to the un-guaranteed performance in practical systems. I...
Cheng Zhong, Zhenan Sun, Tieniu Tan, Zhaofeng He
IMC
2009
ACM
14 years 2 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
CIVR
2007
Springer
273views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Scalable near identical image and shot detection
This paper proposes and compares two novel schemes for near duplicate image and video-shot detection. The first approach is based on global hierarchical colour histograms, using ...
Ondrej Chum, James Philbin, Michael Isard, Andrew ...
MIR
2005
ACM
181views Multimedia» more  MIR 2005»
14 years 1 months ago
Video booklet: a natural video searching and browsing interface
In this paper, we propose a novel system, named Video Booklet, which enables efficient and natural personal video browsing and searching. In the system, firstly representative th...
Cai-Zhi Zhu, Xian-Sheng Hua, Tao Mei, Xiuqing Wu