Sciweavers

829 search results - page 20 / 166
» Adverse selection in online
Sort
View
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
15 years 4 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung
COMSWARE
2007
IEEE
15 years 4 months ago
Real-time End-to-end Network Monitoring in Large Distributed Systems
— Measuring real-time end-to-end network path performance metrics is important for several distributed applications such as media streaming systems (e.g., for switching to paths ...
Han Hee Song, Praveen Yalagandula
TRIDENTCOM
2006
IEEE
15 years 3 months ago
TCP in mixed internet and geo-satellite environments: Experiences and results
— Experiments in real satellite testbeds are relatively rare in practice. In this paper, we are going to share our experience on using one, and comment on selected sets of result...
Cesar Marcondes, Anders Persson, M. Y. Sanadidi, M...
CIDR
2009
152views Algorithms» more  CIDR 2009»
14 years 11 months ago
Visualizing the robustness of query execution
In database query processing, actual run-time conditions (e.g., actual selectivities and actual available memory) very often differ from compile-time expectations of run-time cond...
Goetz Graefe, Harumi A. Kuno, Janet L. Wiener
JCAMD
2010
82views more  JCAMD 2010»
14 years 8 months ago
Making priors a priority
When we build a predictive model of a drug property we rigorously assess its predictive accuracy, but we are rarely able to address the most important question, “How useful will...
Matthew Segall, Andrew Chadwick