Sciweavers

2015 search results - page 187 / 403
» Hidden Software Capabilities
Sort
View
168
Voted
RTAS
2009
IEEE
15 years 9 months ago
Real-Time Video Surveillance over IEEE 802.11 Mesh Networks
In recent years, there has been an increase in video surveillance systems in public and private environments due to a heightened sense of security. The next generation of surveill...
Arvind Kandhalu, Anthony Rowe, Ragunathan Rajkumar...
134
Voted
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
15 years 9 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin
MOBICOM
2006
ACM
15 years 8 months ago
Robust rate adaptation for 802.11 wireless networks
Rate adaptation is a mechanism unspecified by the 802.11 standards, yet critical to the system performance by exploiting the multi-rate capability at the physical layer. In this ...
Starsky H. Y. Wong, Songwu Lu, Hao Yang, Vaduvur B...
124
Voted
ISMIR
2005
Springer
168views Music» more  ISMIR 2005»
15 years 8 months ago
A Novel HMM Approach to Melody Spotting in Raw Audio Recordings
This paper presents a melody spotting system based on Variable Duration Hidden Markov Models (VDHMM’s), capable of locating monophonic melodies in a database of raw audio record...
Aggelos Pikrakis, Sergios Theodoridis
106
Voted
ASPLOS
2004
ACM
15 years 8 months ago
Coherence decoupling: making use of incoherence
This paper explores a new technique called coherence decoupling, which breaks a traditional cache coherence protocol into two protocols: a Speculative Cache Lookup (SCL) protocol ...
Jaehyuk Huh, Jichuan Chang, Doug Burger, Gurindar ...