Sciweavers

3375 search results - page 675 / 675
» Resource Sharing in Performance Models
Sort
View
CCS
2011
ACM
12 years 9 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
SIGIR
2012
ACM
12 years 6 days ago
Boosting multi-kernel locality-sensitive hashing for scalable image retrieval
Similarity search is a key challenge for multimedia retrieval applications where data are usually represented in high-dimensional space. Among various algorithms proposed for simi...
Hao Xia, Pengcheng Wu, Steven C. H. Hoi, Rong Jin
TMC
2012
12 years 5 days ago
Relay-Assisted Transmission with Fairness Constraint for Cellular Networks
Abstract—We consider the problem of relay-assisted transmission for cellular networks. In the considered system, a source node together with n relay nodes are selected in a propo...
Erwu Liu, Qinqing Zhang, Kin K. Leung
BMCBI
2007
167views more  BMCBI 2007»
13 years 9 months ago
AlzPharm: integration of neurodegeneration data using RDF
Background: Neuroscientists often need to access a wide range of data sets distributed over the Internet. These data sets, however, are typically neither integrated nor interopera...
Hugo Y. K. Lam, Luis N. Marenco, Tim Clark, Yong G...
VCIP
2000
128views Communications» more  VCIP 2000»
13 years 11 months ago
Video Quality Experts Group: current results and future directions
Subjective assessment methods have been used reliably for many years to evaluate video quality. They continue to provide the most reliable assessments compared to objective method...
Ann M. Rohaly, Philip J. Corriveau, John M. Libert...