Sciweavers

5111 search results - page 1021 / 1023
» The Embedded Systems Design Challenge
Sort
View
TIFS
2010
143views more  TIFS 2010»
13 years 5 months ago
Face verification across age progression using discriminative methods
Face verification in the presence of age progression is an important problem that has not been widely addressed. In this paper, we study the problem by designing and evaluating dis...
Haibin Ling, Stefano Soatto, Narayanan Ramanathan,...
CHI
2011
ACM
13 years 2 months ago
Apolo: making sense of large network data by combining rich user interaction and machine learning
Extracting useful knowledge from large network datasets has become a fundamental challenge in many domains, from scientific literature to social networks and the web. We introduc...
Duen Horng Chau, Aniket Kittur, Jason I. Hong, Chr...
NOSSDAV
2011
Springer
13 years 1 months ago
A measurement study of resource utilization in internet mobile streaming
The pervasive usage of mobile devices and wireless networking support have enabled more and more Internet streaming services to all kinds of heterogeneous mobile devices. However,...
Yao Liu, Fei Li, Lei Guo, Songqing Chen
VTC
2010
IEEE
176views Communications» more  VTC 2010»
13 years 9 months ago
Exploiting Redundancy in Iterative H.264 Joint Source and Channel Decoding For Robust Video Transmission
— In this paper we propose joint optimisation of soft-bit assisted iterative joint source and channel decoding with the aid of our proposed EXIT chart optimised redundant source ...
Nasruminallah, Lajos Hanzo
CCS
2009
ACM
14 years 11 months ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...
« Prev « First page 1021 / 1023 Last » Next »