Sciweavers

13841 search results - page 2733 / 2769
» Algorithms and Constraint Programming
Sort
View
ISSTA
2004
ACM
15 years 2 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
MM
2004
ACM
208views Multimedia» more  MM 2004»
15 years 2 months ago
Fast and robust video clip search using index structure
Content based retrieval of similar multimedia objects (e.g. images, text, and videos) is an important research issue in the field of multimedia database. In this demo, we present ...
Ling-Yu Duan, Junsong Yuan, Qi Tian, Changsheng Xu
89
Voted
MM
2004
ACM
188views Multimedia» more  MM 2004»
15 years 2 months ago
A new method to segment playfield and its applications in match analysis in sports video
With the growing popularity of digitized sports video, automatic analysis of them need be processed to facilitate semantic summarization and retrieval. Playfield plays the fundame...
Shuqiang Jiang, Qixiang Ye, Wen Gao, Tiejun Huang
MOBICOM
2004
ACM
15 years 2 months ago
End-to-end performance and fairness in multihop wireless backhaul networks
Wireless IEEE 802.11 networks in residences, small businesses, and public “hot spots” typically encounter the wireline access link (DSL, cable modem, T1, etc.) as the slowest ...
Violeta Gambiroza, Bahareh Sadeghi, Edward W. Knig...
MOBICOM
2004
ACM
15 years 2 months ago
Exploiting medium access diversity in rate adaptive wireless LANs
Recent years have seen the growing popularity of multi-rate wireless network devices (e.g., 802.11a cards) that can exploit variations in channel conditions and improve overall ne...
Zhengrong Ji, Yi Yang, Junlan Zhou, Mineo Takai, R...
« Prev « First page 2733 / 2769 Last » Next »