Sciweavers

4150 search results - page 690 / 830
» A Practical Approach to Model Extension
Sort
View
151
Voted
EDBT
2008
ACM
102views Database» more  EDBT 2008»
16 years 3 months ago
Summary management in P2P systems
Sharing huge, massively distributed databases in P2P systems is inherently difficult. As the amount of stored data increases, data localization techniques become no longer suffici...
Rabab Hayek, Guillaume Raschia, Patrick Valduriez,...
CVPR
2010
IEEE
16 years 1 days ago
Probabilistic 3D Occupancy Flow with Latent Silhouette Cues
In this paper we investigate shape and motion retrieval in the context of multi-camera systems. We propose a new lowlevel analysis based on latent silhouette cues, particularly su...
Li Guan, Jean-Sebastien Franco, Edmond Boyer, Marc...
CVPR
2010
IEEE
16 years 1 days ago
Robust video denoising using low rank matrix completion
Most existing video denoising algorithms assume a single statistical model of image noise, e.g. additive Gaussian white noise, which often is violated in practice. In this paper, ...
Hui Ji, Chaoqiang Liu, Zuowei Shen, Yuhong Xu
127
Voted
SAC
2010
ACM
15 years 10 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
144
Voted
AINA
2009
IEEE
15 years 10 months ago
Business Compliance Governance in Service-Oriented Architectures
Abstract — Governing business compliance with regulations, laws, best practices, contracts, and the like is not an easy task, and so far there are only limited software products ...
Florian Daniel, Fabio Casati, Vincenzo D'Andrea, E...