Sciweavers

419 search results - page 53 / 84
» Strategic Evaluation in Complex Domains
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Maximizing Resilient Throughput in Peer-to-Peer Network: A Generalized Flow Approach
—A unique challenge in P2P network is that the peer dynamics (departure or failure) cause unavoidable disruption to the downstream peers. While many works have been dedicated to ...
Bin Chang, Yi Cui, Yuan Xue
CASES
2004
ACM
14 years 1 months ago
A low power architecture for embedded perception
Recognizing speech, gestures, and visual features are important interface capabilities for future embedded mobile systems. Unfortunately, the real-time performance requirements of...
Binu K. Mathew, Al Davis, Michael Parker
APCCAS
2002
IEEE
156views Hardware» more  APCCAS 2002»
14 years 1 months ago
Bit-plane watermarking for zerotree-coded images
In this paper, we develop a robust bit-plane watermarking technique based on zerotree coding. A robust watermark is an imperceptible but indelible code that can be used for owners...
Shih-Hsuan Yang, Hsin-Chang Chen
CVPR
2010
IEEE
14 years 1 months ago
Motion Fields to Predict Play Evolution in Dynamic Sport Scenes
Videos of multi-player team sports provide a challenging domain for dynamic scene analysis. Player actions and interactions are complex as they are driven by many factors, such as...
Kihwan Kim, Matthias Grundmann, Ariel Shamir, Iain...
EDBT
2009
ACM
135views Database» more  EDBT 2009»
14 years 1 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso