Sciweavers

2774 search results - page 411 / 555
» Exploiting Deep Structure
Sort
View
EDOC
2006
IEEE
15 years 10 months ago
Secure Dissemination of XML Content Using Structure-based Routing
The paper proposes an approach to content dissemination that exploits the structural properties of XML Document Object Model in order to provide efficient dissemination by at the...
Ashish Kundu, Elisa Bertino
ICMCS
2006
IEEE
237views Multimedia» more  ICMCS 2006»
15 years 10 months ago
Matching Faces with Textual Cues in Soccer Videos
In soccer videos, most significant actions are usually followed by close–up shots of players that take part in the action itself. Automatically annotating the identity of the p...
Marco Bertini, Alberto Del Bimbo, Walter Nunziati
INFOCOM
2006
IEEE
15 years 10 months ago
A Locating-First Approach for Scalable Overlay Multicast
— Recent proposals in multicast overlay construction have demonstrated the importance of exploiting underlying network topology. However, these topology-aware proposals often rel...
Mohamed Ali Kâafar, Thierry Turletti, Walid ...
ISCAS
2006
IEEE
106views Hardware» more  ISCAS 2006»
15 years 10 months ago
Integrating observability don't cares in all-solution SAT solvers
— All-solution Boolean satisfiability (SAT) solvers are engines employed to find all the possible solutions to a SAT problem. Their applications are found throughout the EDA in...
Sean Safarpour, Andreas G. Veneris, Rolf Drechsler
ISCC
2006
IEEE
188views Communications» more  ISCC 2006»
15 years 10 months ago
Dejong Function Optimization by Means of a Parallel Approach to Fuzzified Genetic Algorithm
Genetic Algorithms are very powerful search methods that are used in different optimization problems. Parallel versions of genetic algorithms are easily implemented and usually in...
Ebrahim Bagheri, Hossein Deldari