Sciweavers

75 search results - page 10 / 15
» Monitoring and Management of Structured Peer-to-Peer Systems
Sort
View
ECBS
2003
IEEE
145views Hardware» more  ECBS 2003»
14 years 24 days ago
Model Checking and Evidence Exploration
We present an algebraic framework for evidence exploration: the process of interpreting, manipulating, and navigating the proof structure or evidence produced by a model checker w...
Yifei Dong, C. R. Ramakrishnan, Scott A. Smolka
ISEMANTICS
2010
13 years 9 months ago
Twarql: tapping into the wisdom of the crowd
Twarql is an infrastructure translating microblog posts from Twitter as Linked Open Data in real-time. The approach employed in Twarql can be summarized as follows: (1) extract co...
Pablo N. Mendes, Alexandre Passant, Pavan Kapanipa...
IH
1999
Springer
13 years 11 months ago
On the Design of a Watermarking System: Considerations and Rationales
This paper summarizes considerations and rationales for the design of a watermark detector. In particular, we relate watermark detection to the problem of signal detection in the p...
Jean-Paul M. G. Linnartz, Geert Depovere, Ton Kalk...
IWCMC
2010
ACM
13 years 9 months ago
A flow trace generator using graph-based traffic classification techniques
We propose a novel methodology to generate realistic network flow traces to enable systematic evaluation of network monitoring systems in various traffic conditions. Our technique...
Peter Siska, Marc Ph. Stoecklin, Andreas Kind, Tor...
ICDE
2008
IEEE
232views Database» more  ICDE 2008»
14 years 8 months ago
Continuous Content-Based Copy Detection over Streaming Videos
Digital videos are increasingly adopted in various multimedia applications where they are usually broadcasted or transmitted as video streams. Continuously monitoring copies on the...
Ying Yan, Beng Chin Ooi, Aoying Zhou