Sciweavers

1687 search results - page 334 / 338
» Which pointer analysis should I use
Sort
View
MMSEC
2006
ACM
231views Multimedia» more  MMSEC 2006»
14 years 1 months ago
JPEG2000-based secure image authentication
We present an efficient JPEG2000-based image authentication scheme, which is robust to JPEG compression and other allowed signal processing operations. Positive wavelet-based wate...
Mathias Schlauweg, Dima Pröfrock, Erika M&uum...
MSWIM
2005
ACM
14 years 1 months ago
Adaptive transmission opportunity with admission control for IEEE 802.11e networks
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Adlen Ksentini, Abdelhak Guéroui, Mohamed N...
ESWS
2005
Springer
14 years 1 months ago
RELFIN - Topic Discovery for Ontology Enhancement and Annotation
While classic information retrieval methods return whole documents as a result of a query, many information demands would be better satisfied by fine-grain access inside the docu...
Markus Schaal, Roland M. Müller, Marko Brunze...
MM
2004
ACM
170views Multimedia» more  MM 2004»
14 years 1 months ago
Effective automatic image annotation via a coherent language model and active learning
Image annotations allow users to access a large image database with textual queries. There have been several studies on automatic image annotation utilizing machine learning techn...
Rong Jin, Joyce Y. Chai, Luo Si
MSWIM
2004
ACM
14 years 1 months ago
Consistency challenges of service discovery in mobile ad hoc networks
Emerging “urban” ad hoc networks resulting from a large number of individual WLAN users challenge the way users could explore and interact with their physical surroundings. Ro...
Christian Frank, Holger Karl