Sciweavers

727 search results - page 106 / 146
» Making Distortions Comprehensible
Sort
View
SSS
2010
Springer
160views Control Systems» more  SSS 2010»
13 years 7 months ago
A Comparative Study of Rateless Codes for P2P Persistent Storage
Abstract. This paper evaluates the performance of two seminal rateless erasure codes, LT Codes and Online Codes. Their properties make them appropriate for coping with communicatio...
Heverson Borba Ribeiro, Emmanuelle Anceaume
CNL
2009
13 years 7 months ago
Development of a Controlled Natural Language Interface for Semantic MediaWiki
Semantic wikis support the collaborative creation, editing and utilization of semantically-enriched content, and they may therefore be wellsuited to addressing problems associated ...
Paul R. Smart, Jie Bao, Dave Braines, Nigel R. Sha...
IJACTAICIT
2010
192views more  IJACTAICIT 2010»
13 years 7 months ago
Service Level Security using Expected Clandestine Figure for Corroboration of Web Service Consumer
In the e-age, internet and e-affairs are the composite blend of business process and technology; the organization must retain the state of computing system or risk malicious assau...
M. S. Saleem Basha
IJHPCA
2010
111views more  IJHPCA 2010»
13 years 7 months ago
Understanding Application Performance via Micro-benchmarks on Three Large Supercomputers: Intrepid, Ranger and Jaguar
Emergence of new parallel architectures presents new challenges for application developers. Supercomputers vary in processor speed, network topology, interconnect communication ch...
Abhinav Bhatele, Lukasz Wesolowski, Eric J. Bohm, ...
CVPR
2011
IEEE
13 years 6 months ago
Face Recognition in Unconstrained Videos with Matched Background Similarity
Recognizing faces in unconstrained videos is a task of mounting importance. While obviously related to face recognition in still images, it has its own unique characteristics and ...
Lior Wolf, Tal Hassner, Itay Maoz