Sciweavers

501 search results - page 56 / 101
» Redundancy and Diversity in Security
Sort
View
ICMCS
2009
IEEE
126views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Sort-Merge feature selection and fusion methods for classification of unstructured video
We explore the problem of rapid automatic semantic tagging of video frames of unstructured (unedited) videos. We apply the Sort-Merge algorithm for feature selection on a large (&...
Mitchell J. Morris, John R. Kender
ICASSP
2011
IEEE
12 years 11 months ago
Application control for fast adaptive error resilient H.264/AVC streaming over IP wireless networks
Following the joint source and channel coding paradigm, we propose in this article an application controlling strategy to allow fast adaptation of multimedia transmission to the i...
Catherine Lamy-Bergot, Benjamin Gadat
KDD
2012
ACM
187views Data Mining» more  KDD 2012»
11 years 10 months ago
Online learning to diversify from implicit feedback
In order to minimize redundancy and optimize coverage of multiple user interests, search engines and recommender systems aim to diversify their set of results. To date, these dive...
Karthik Raman, Pannaga Shivaswamy, Thorsten Joachi...
CCS
2009
ACM
14 years 8 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
ADC
2007
Springer
107views Database» more  ADC 2007»
14 years 2 months ago
A Processing Model for the Optimal Querying of Encrypted XML Documents in XQuery
XQuery is a powerful and convenient language that is designed for querying the data in XML documents. In this paper, we address how to optimally query encrypted XML documents usin...
Tao-Ku Chang, Gwan-Hwan Hwang