Sciweavers

2236 search results - page 281 / 448
» Intrusion detection techniques and approaches
Sort
View
MACOM
2010
13 years 8 months ago
Quality of Service Oriented Analysis of Cross-Layer Design in Wireless Ad Hoc Networks
Abstract. In wireless ad hoc networks, cross-layer design aims at reducing multiple access interference and thus obtaining a higher spatial reuse. In order to identify the most sui...
Ulrike Korger, Christian Hartmann, Katsutoshi Kusu...
ASPLOS
2011
ACM
13 years 2 months ago
Improving the performance of trace-based systems by false loop filtering
Trace-based compilation is a promising technique for language compilers and binary translators. It offers the potential to expand the compilation scopes that have traditionally be...
Hiroshige Hayashizaki, Peng Wu, Hiroshi Inoue, Mau...
CHI
2004
ACM
14 years 11 months ago
IDeixis: image-based Deixis for finding location-based information
In this paper we describe an image-based approach to finding location-based information from camera-equipped mobile devices. We introduce a point-by-photograph paradigm, where user...
Tom Yeh, Konrad Tollmar, Trevor Darrell
MMM
2010
Springer
203views Multimedia» more  MMM 2010»
14 years 7 months ago
TV News Story Segmentation Based on Semantic Coherence and Content Similarity
In this paper, we introduce and evaluate two novel approaches, one using video stream and the other using close-caption text stream, for segmenting TV news into stories. The segmen...
Hemant Misra, Frank Hopfgartner, Anuj Goyal, P. Pu...
ICDE
2006
IEEE
152views Database» more  ICDE 2006»
14 years 4 months ago
Redundancy Awareness in SQL Queries
In this paper, we study SQL queries with aggregate subqueries that share common tables and conditions with the outer query. While several approaches can deal with such queries, th...
Bin Cao, Antonio Badia