Sciweavers

2469 search results - page 438 / 494
» Self-Protection of Web Content
Sort
View
ICPADS
2008
IEEE
14 years 3 months ago
Textures in Second Life: Measurement and Analysis
We collected packet traces from Second Life client sessions and analyzed the packet contents. We observed that textures constitute a majority of the network traffic. We further c...
Huiguang Liang, Mehul Motani, Wei Tsang Ooi
MMM
2008
Springer
217views Multimedia» more  MMM 2008»
14 years 3 months ago
Emotion-Based Music Visualization Using Photos
Music players for personal computers are often featured with music visualization by generating animated patterns according to the music’s low-level features such as loudness and ...
Chin-Han Chen, Ming-Fang Weng, Shyh-Kang Jeng, Yun...
DASFAA
2007
IEEE
143views Database» more  DASFAA 2007»
14 years 3 months ago
Using Redundant Bit Vectors for Near-Duplicate Image Detection
Images are amongst the most widely proliferated form of digital information due to affordable imaging technologies and the Web. In such an environment, the use of digital watermar...
Jun Jie Foo, Ranjan Sinha
DSN
2007
IEEE
14 years 3 months ago
Scaling and Continuous Availability in Database Server Clusters through Multiversion Replication
In this paper, we study replication techniques for scaling and continuous operation for a dynamic content server. Our focus is on supporting transparent and fast reconfiguration ...
Kaloian Manassiev, Cristiana Amza
HICSS
2007
IEEE
164views Biometrics» more  HICSS 2007»
14 years 3 months ago
The Social Structure of Tagging Internet Video on del.icio.us
Abstract— The ability to tag resources with uncontrolled metadata or “folksonomies” is often characterized as one of the central features of “Web 2.0” applications. Folks...
John C. Paolillo, Shashikant Penumarthy