Sciweavers

1040 search results - page 161 / 208
» TCAM-conscious Algorithms for Data Streams
Sort
View
MM
2009
ACM
144views Multimedia» more  MM 2009»
14 years 3 months ago
Manipulating lossless video in the compressed domain
A compressed-domain transformation is one that operates directly on the compressed format, rather than requiring conversion to an uncompressed format prior to processing. Performi...
William Thies, Steven Hall, Saman P. Amarasinghe
SDM
2007
SIAM
106views Data Mining» more  SDM 2007»
13 years 10 months ago
Approximating Representations for Large Numerical Databases
The paper introduces a notion of support for realvalued functions. It is shown how to approximate supports of a large class of functions based on supports of so called polynomial ...
Szymon Jaroszewicz, Marcin Korzen
ICDE
2006
IEEE
167views Database» more  ICDE 2006»
14 years 10 months ago
Better Burst Detection
A burst is a large number of events occurring within a certain time window. As an unusual activity, it's a noteworthy phenomenon in many natural and social processes. Many da...
Xin Zhang, Dennis Shasha
IPSN
2009
Springer
14 years 3 months ago
Predictive QoS routing to mobile sinks in wireless sensor networks
We present an algorithm for data delivery to mobile sinks in wireless sensor networks. Our algorithm is based on information potentials, which we extend to account for mobility. W...
Branislav Kusy, HyungJune Lee, Martin Wicke, Nikol...
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
14 years 3 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin