Sciweavers

3528 search results - page 649 / 706
» A New Approach to Planning in Networks
Sort
View
IJCNN
2008
IEEE
15 years 4 months ago
Cognitive learning and the multimodal memory game: Toward human-level machine learning
— Machine learning has made great progress during the last decades and is being deployed in a wide range of applications. However, current machine learning techniques are far fro...
Byoung-Tak Zhang
INFOCOM
2008
IEEE
15 years 4 months ago
Multicast Tree Diameter for Dynamic Distributed Interactive Applications
Abstract—Latency reduction in distributed interactive applications has been studied intensively. Such applications may have stringent latency requirements and dynamic user groups...
Knut-Helge Vik, Pål Halvorsen, Carsten Griwo...
ISM
2008
IEEE
111views Multimedia» more  ISM 2008»
15 years 4 months ago
Secure and Low Cost Selective Encryption for JPEG2000
Selective encryption is a new trend in content protection. It aims at reducing the amount of data to encrypt while achieving a sufficient and inexpensive security. This approach ...
Ayoub Massoudi, Frédéric Lefè...
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
15 years 4 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
ICMCS
2007
IEEE
144views Multimedia» more  ICMCS 2007»
15 years 4 months ago
Splog Detection using Content, Time and Link Structures
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms and splogs corrupt blog search results as well as waste netw...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...