Sciweavers

5451 search results - page 923 / 1091
» On very high degrees
Sort
View
CIKM
2007
Springer
14 years 4 months ago
Optimal proactive caching in peer-to-peer network: analysis and application
As a promising new technology with the unique properties like high efficiency, scalability and fault tolerance, Peer-toPeer (P2P) technology is used as the underlying network to b...
Weixiong Rao, Lei Chen 0002, Ada Wai-Chee Fu, Ying...
ISI
2008
Springer
13 years 10 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
BMCBI
2005
113views more  BMCBI 2005»
13 years 10 months ago
Microarray scanner calibration curves: characteristics and implications
Background: Microarray-based measurement of mRNA abundance assumes a linear relationship between the fluorescence intensity and the dye concentration. In reality, however, the cal...
Leming M. Shi, Weida Tong, Zhenqiang Su, Tao Han, ...
CVPR
2007
IEEE
15 years 3 days ago
Topology matching for 3D video compression
This paper presents a new technique to reduce the storage cost of high quality 3D video. In 3D video [12], a sequence of 3D objects represents scenes in motion. Every frame is com...
Tony Tung, Francis Schmitt, Takashi Matsuyama
CVPR
2008
IEEE
15 years 3 days ago
Utilizing semantic word similarity measures for video retrieval
This is a high level computer vision paper, which employs concepts from Natural Language Understanding in solving the video retrieval problem. Our main contribution is the utiliza...
Yusuf Aytar, Mubarak Shah, Jiebo Luo