Sciweavers

3872 search results - page 644 / 775
» The Java memory model
Sort
View
ICMCS
2005
IEEE
170views Multimedia» more  ICMCS 2005»
14 years 3 months ago
Affective content analysis in comedy and horror videos by audio emotional event detection
We study the problem of affective content analysis. In this paper we think of affective contents as those video/audio segments, which may cause an audience’s strong reactions or...
Min Xu, Liang-Tien Chia, Jesse S. Jin
ICNP
2005
IEEE
14 years 3 months ago
Trading Precision for Stability in Congestion Control with Probabilistic Packet Marking
In pricing-based congestion control protocols it is common to assume that the rate of congestion feedback from the network is limited to a single bit per packet. To obtain a preci...
Jonathan K. Shapiro, C. V. Hollot, Donald F. Towsl...
PADS
2005
ACM
14 years 3 months ago
Concurrent Replication of Parallel and Distributed Simulations
Parallel and distributed simulations enable the analysis of complex systems by concurrently exploiting the aggregate computation power and memory of clusters of execution units. I...
Luciano Bononi, Michele Bracuto, Gabriele D'Angelo...
PKDD
2005
Springer
164views Data Mining» more  PKDD 2005»
14 years 3 months ago
Clustering and Prediction of Mobile User Routes from Cellular Data
Location-awareness and prediction of future locations is an important problem in pervasive and mobile computing. In cellular systems (e.g., GSM) the serving cell is easily availabl...
Kari Laasonen
SPC
2005
Springer
14 years 3 months ago
TrustAC: Trust-Based Access Control for Pervasive Devices
Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a s...
Florina Almenárez Mendoza, Andrés Ma...