Sciweavers

4273 search results - page 676 / 855
» Improving proactive information systems
Sort
View
INFOCOM
2010
IEEE
15 years 1 months ago
MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming
Network coding has been shown to be capable of greatly improving quality of service in P2P live streaming systems (e.g., IPTV). However, network coding is vulnerable to pollution a...
Qiyan Wang, Long Vu, Klara Nahrstedt, Himanshu Khu...
UIST
2010
ACM
15 years 1 months ago
Eden: supporting home network management through interactive visual tools
As networking moves into the home, home users are increasingly being faced with complex network management chores. Previous research, however, has demonstrated the difficulty many...
Jeonghwa Yang, W. Keith Edwards, David Haslem
ICASSP
2009
IEEE
15 years 1 months ago
Audiovisual celebrity recognition in unconstrained web videos
The number of video clips available online is growing at a tremendous pace. Conventionally, user-supplied metadata text, such as the title of the video and a set of keywords, has ...
Mehmet Emre Sargin, Hrishikesh Aradhye, Pedro J. M...
ICC
2009
IEEE
15 years 1 months ago
On the Interaction Between Channel Coding and Hierarchical Modulation
1 Classical systems using hierarchical modulation (such as DVB-SH) involve a "high-priority" (HP) and a "lowpriority" (LP) bit stream that are separately and in...
Seyed Mohammad Sajad Sadough, Pierre Duhamel
ICIP
2009
IEEE
15 years 1 months ago
Content-based image retrieval: An application to tattoo images
Tattoo images on human body have been routinely collected and used in law enforcement to assist in suspect and victim identification. However, the current practice of matching tat...
Anil K. Jain, Jung-Eun Lee, Rong Jin, Nicholas Gre...