Sciweavers

12783 search results - page 2468 / 2557
» Experimenting with computing
Sort
View
MIDDLEWARE
2004
Springer
14 years 4 months ago
iOverlay: A Lightweight Middleware Infrastructure for Overlay Application Implementations
The very nature of implementing and evaluating fully distributed algorithms or protocols in application-layer overlay networks involves certain programming tasks that are at best m...
Baochun Li, Jiang Guo, Mea Wang
PCM
2004
Springer
224views Multimedia» more  PCM 2004»
14 years 4 months ago
Fast and Robust Short Video Clip Search for Copy Detection
Query by video clip (QVC) has attracted wide research interests in multimedia information retrieval. In general, QVC may include feature extraction, similaritymeasure,databaseorgan...
Junsong Yuan, Ling-Yu Duan, Qi Tian, Surendra Rang...
RAID
2004
Springer
14 years 4 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka
RULEML
2004
Springer
14 years 4 months ago
Rule Learning for Feature Values Extraction from HTML Product Information Sheets
The Web is now a huge information repository with a rich semantic structure that, however, is primarily addressed to human understanding rather than automated processing by a compu...
Costin Badica, Amelia Badica
ETRA
2010
ACM
178views Biometrics» more  ETRA 2010»
14 years 4 months ago
Biometric identification via an oculomotor plant mathematical model
There has been increased interest in reliable, non-intrusive methods of biometric identification due to the growing emphasis on security and increasing prevalence of identity thef...
Oleg V. Komogortsev, Sampath Jayarathna, Cecilia R...
« Prev « First page 2468 / 2557 Last » Next »