Sciweavers

3657 search results - page 557 / 732
» A Study of Practical Deduplication
Sort
View
CORR
2006
Springer
92views Education» more  CORR 2006»
14 years 10 months ago
Myopic Coding in Wireless Networks
Abstract -We investigate the achievable rate of data transmission from sources to sinks through a multiple-relay network. We study achievable rates for omniscient coding, in which ...
Lawrence Ong, Mehul Motani
DEBU
2006
142views more  DEBU 2006»
14 years 10 months ago
Automated Storage Management with QoS Guarantee in Large-scale Virtualized Storage Systems
Storage virtualization in modern storage systems allows variability in the number of "physical" disks supporting a single "virtual" disk. In practice, IO workl...
Lin Qiao, Balakrishna R. Iyer, Divyakant Agrawal, ...
102
Voted
IJACT
2008
158views more  IJACT 2008»
14 years 10 months ago
Efficient lattice-based signature scheme
: In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece public key cryptosystem, in which security is related to the hardness of approximat...
Thomas Plantard, Willy Susilo, Khin Than Win, Qion...
IJCV
2008
139views more  IJCV 2008»
14 years 10 months ago
Multilevel Image Coding with Hyperfeatures
Histograms of local appearance descriptors are a popular representation for visual recognition. They are highly discriminant with good resistance to local occlusions and to geomet...
Ankur Agarwal, Bill Triggs
90
Voted
IJMMS
2008
90views more  IJMMS 2008»
14 years 10 months ago
Pair programming and the mysterious role of the navigator
Computer programming is generally understood to be highly challenging and since its inception a wide range of approaches, tools and methodologies have been developed to assist in ...
Sallyann Bryant, Pablo Romero, Benedict du Boulay