Sciweavers

4137 search results - page 794 / 828
» On the number of matchings of a tree
Sort
View
IUI
2004
ACM
14 years 1 months ago
Robust sketched symbol fragmentation using templates
Analysis of sketched digital ink is often aided by the division of stroke points into perceptually-salient fragments based on geometric features. Fragmentation has many applicatio...
Heloise Hwawen Hse, Michael Shilman, A. Richard Ne...
PODC
2004
ACM
14 years 1 months ago
Signed quorum systems
Abstract With n servers that independently fail with probability of p < 0.5, it is well known that the majority quorum system achieves the best availability among all quorum sys...
Haifeng Yu
SIGCOMM
2004
ACM
14 years 1 months ago
Building a better NetFlow
Network operators need to determine the composition of the traffic mix on links when looking for dominant applications, users, or estimating traffic matrices. Cisco’s NetFlow ha...
Cristian Estan, Ken Keys, David Moore, George Varg...
VLDB
2004
ACM
245views Database» more  VLDB 2004»
14 years 1 months ago
A Multi-Purpose Implementation of Mandatory Access Control in Relational Database Management Systems
Mandatory Access Control (MAC) implementations in Relational Database Management Systems (RDBMS) have focused solely on Multilevel Security (MLS). MLS has posed a number of challe...
Walid Rjaibi, Paul Bird
ECCV
2010
Springer
14 years 1 months ago
Backprojection Revisited: Scalable Multi-view Object Detection and Similarity Metrics for Detections
Hough transform based object detectors learn a mapping from the image domain to a Hough voting space. Within this space, object hypotheses are formed by local maxima. The votes con...