Sciweavers

1016 search results - page 138 / 204
» Explore or Exploit
Sort
View
MM
2003
ACM
116views Multimedia» more  MM 2003»
14 years 2 months ago
Photo2Video
To exploit rich content embedded in a single photograph, a system named Photo2Video was developed to automatically convert a photographic series into a video by simulating camera ...
Xian-Sheng Hua, Lie Lu, HongJiang Zhang
PPPJ
2003
ACM
14 years 2 months ago
A new approach for implementing stand-alone and Web-based interpreters for Java
Compared to imperative programming languages like Pascal or Basic, or functional programming languages like ML or Haskell learning Java is hampered by the fact that to get even th...
Stephan Diehl, Claudia Bieg
SC
2003
ACM
14 years 2 months ago
Traffic-based Load Balance for Scalable Network Emulation
Load balance is critical to achieving scalability for large network emulation studies, which are of compelling interest for emerging Grid, Peer to Peer, and other distributed appl...
Xin Liu, Andrew A. Chien
ECML
2003
Springer
14 years 2 months ago
Optimising Performance of Competing Search Engines in Heterogeneous Web Environments
Abstract. Distributed heterogeneous search environments are an emerging phenomenon in Web search, in which topic-specific search engines provide search services, and metasearchers...
Rinat Khoussainov, Nicholas Kushmerick
FC
2003
Springer
111views Cryptology» more  FC 2003»
14 years 2 months ago
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
Abstract. Thanks to their broad international acceptance and availability in high denominations, there is widespread concern that Euro banknotes may provide an attractive new curre...
Ari Juels, Ravikanth Pappu