Sciweavers

380 search results - page 46 / 76
» Time Capsule Signature
Sort
View
GIS
2010
ACM
13 years 6 months ago
Spatiotemporal summarization of traffic data streams
With resource-efficient summarization and accurate reconstruction of the historic traffic sensor data, one can effectively manage and optimize transportation systems (e.g., road n...
Bei Pan, Ugur Demiryurek, Farnoush Banaei Kashani,...
HPDC
2006
IEEE
14 years 2 months ago
Path Grammar Guided Trace Compression and Trace Approximation
Trace-driven simulation is an important technique used in the evaluation of computer architecture innovations. However using it for studying parallel computers and applications is...
Xiaofeng Gao, Allan Snavely, Larry Carter
ICIP
2005
IEEE
14 years 10 months ago
Hiding privacy information in video surveillance system
This paper proposes a detailed framework of storing privacy information in surveillance video as a watermark. Authorized personnel is not only removed from the surveillance video ...
Wei Zhang, Sen-Ching S. Cheung, Minghua Chen
ICASSP
2009
IEEE
14 years 3 months ago
LSH banding for large-scale retrieval with memory and recall constraints
Locality Sensitive Hashing (LSH) is widely used for efficient retrieval of candidate matches in very large audio, video, and image systems. However, extremely large reference dat...
Michele Covell, Shumeet Baluja
SEFM
2009
IEEE
14 years 3 months ago
A Computability Perspective on Self-Modifying Programs
Abstract—In order to increase their stealth, malware commonly use the self-modification property of programs. By doing so, programs can hide their real code so that it is diffi...
Guillaume Bonfante, Jean-Yves Marion, Daniel Reyna...