Sciweavers

3827 search results - page 746 / 766
» Mining Online Users
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Adding Capacity Points to a Wireless Mesh Network Using Local Search
Abstract— Wireless mesh network deployments are popular as a cost-effective means to provide broadband connectivity to large user populations. As the network usage grows, network...
Joshua Robinson, Mustafa Uysal, Ram Swaminathan, E...
HPDC
2007
IEEE
14 years 2 months ago
An architecture for virtual organization (VO)-based effective peering of content delivery networks
The proprietary nature of existing Content Delivery Networks (CDNs) means they are closed and do not naturally cooperate, resulting in “islands” of CDNs. Finding ways for dist...
Al-Mukaddim Khan Pathan, James Broberg, Kris Buben...
CIVR
2007
Springer
144views Image Analysis» more  CIVR 2007»
14 years 2 months ago
Image retrieval on large-scale image databases
Online image repositories such as Flickr contain hundreds of millions of images and are growing quickly. Along with that the needs for supporting indexing, searching and browsing ...
Eva Hörster, Rainer Lienhart, Malcolm Slaney
COST
2007
Springer
116views Multimedia» more  COST 2007»
14 years 2 months ago
ECESS Platform for Web Based TTS Modules and Systems Evaluation
The paper presents platform for web based TTS modules and systems evaluation named RES (Remote Evaluation System). It is being developed within the European Centre of Excellence fo...
Matej Rojc, Harald Höge, Zdravko Kacic
FC
2007
Springer
158views Cryptology» more  FC 2007»
14 years 2 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou