Sciweavers

1981 search results - page 327 / 397
» Model-Checking Hierarchical Structures
Sort
View
CCS
2007
ACM
14 years 3 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
CIVR
2007
Springer
128views Image Analysis» more  CIVR 2007»
14 years 3 months ago
An empirical study of inter-concept similarities in multimedia ontologies
Generic concept detection has been a widely studied topic in recent research on multimedia analysis and retrieval, but the issue of how to exploit the structure of a multimedia on...
Markus Koskela, Alan F. Smeaton
HOLOMAS
2007
Springer
14 years 3 months ago
A Holonic Metamodel for Agent-Oriented Analysis and Design
Abstract. Holonic multiagent systems (hmas) offers a promising software engineering approach for developing applications in complex domains characterized by a hierarchical structu...
Massimo Cossentino, Nicolas Gaud, Stéphane ...
ICCSA
2007
Springer
14 years 3 months ago
Low-Complexity Unequal Packet Loss Protection for Real-Time Video over Ubiquitous Networks
Ubiquitous multimedia services are emerging to be available at anytime and anywhere using a variety of computing devices. In this paper, we propose a low-complexity unequal loss pr...
Hojin Ha, Changhoon Yim, Young Yong Kim
MLMI
2007
Springer
14 years 3 months ago
Using Prosodic Features in Language Models for Meetings
Abstract. Prosody has been actively studied as an important knowledge source for speech recognition and understanding. In this paper, we are concerned with the question of exploiti...
Songfang Huang, Steve Renals