Sciweavers

40212 search results - page 7842 / 8043
» More
Sort
View
TDSC
2010
218views more  TDSC 2010»
15 years 2 months ago
Secure Data Objects Replication in Data Grid
—Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical informati...
Manghui Tu, Peng Li, I-Ling Yen, Bhavani M. Thurai...
TIP
2010
138views more  TIP 2010»
15 years 2 months ago
Motion Tuned Spatio-Temporal Quality Assessment of Natural Videos
—There has recently been a great deal of interest in the development of algorithms that objectively measure the integrity of video signals. Since video signals are being delivere...
Kalpana Seshadrinathan, Alan C. Bovik
TKDE
2010
182views more  TKDE 2010»
15 years 2 months ago
MILD: Multiple-Instance Learning via Disambiguation
In multiple-instance learning (MIL), an individual example is called an instance and a bag contains a single or multiple instances. The class labels available in the training set ...
Wu-Jun Li, Dit-Yan Yeung
TKDE
2010
195views more  TKDE 2010»
15 years 2 months ago
Query Processing Using Distance Oracles for Spatial Networks
—The popularity of location-based services and the need to do real-time processing on them has led to an interest in performing queries on transportation networks, such as findin...
Jagan Sankaranarayanan, Hanan Samet
TMC
2010
141views more  TMC 2010»
15 years 2 months ago
Energy-Optimal Scheduling with Dynamic Channel Acquisition in Wireless Downlinks
—We consider a wireless base station serving L users through L time-varying channels. It is well known that opportunistic scheduling algorithms with full channel state informatio...
Chih-Ping Li, Michael J. Neely
« Prev « First page 7842 / 8043 Last » Next »