Sciweavers

20778 search results - page 3758 / 4156
» Algorithms for Data Migration
Sort
View
MM
2010
ACM
127views Multimedia» more  MM 2010»
15 years 5 months ago
Mining and cropping common objects from images
Discovering common objects that appear frequently in a number of images is a challenging problem, due to (1) the appearance variations of the same common object and (2) the enormo...
Gangqiang Zhao, Junsong Yuan
SIGCOMM
2010
ACM
15 years 5 months ago
Scalable flow-based networking with DIFANE
Ideally, enterprise administrators could specify fine-grain policies that drive how the underlying switches forward, drop, and measure traffic. However, existing techniques for fl...
Minlan Yu, Jennifer Rexford, Michael J. Freedman, ...
SIGCOMM
2010
ACM
15 years 5 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
SIGMOD
2010
ACM
249views Database» more  SIGMOD 2010»
15 years 5 months ago
Worry-free database upgrades: automated model-driven evolution of schemas and complex mappings
Schema evolution is an unavoidable consequence of the application development lifecycle. The two primary schemas in an application, the client conceptual object model and the pers...
James F. Terwilliger, Philip A. Bernstein, Adi Unn...
ICASSP
2010
IEEE
15 years 5 months ago
Histogram equalization and noise masking for robust speech recognition
Mismatch between training and test conditions deteriorates the performance of speech recognizers. This paper investigates the combination of parametric histogram equalization (pHE...
Xueru Zhang, Kris Demuynck, Hugo Van Hamme
« Prev « First page 3758 / 4156 Last » Next »