Sciweavers

2714 search results - page 375 / 543
» Approximation Schemes for Scheduling
Sort
View
110
Voted
ICIP
2006
IEEE
16 years 2 months ago
Robust Signature-Based Geometric Invariant Copyright Protection
The most significant bit (MSB)-plane of an image is least likely to change by the most signal processing operations. Watermarking techniques are, however, unable to exploit the MS...
Mohammad Awrangjeb, M. Manzur Murshed
87
Voted
ICML
2006
IEEE
16 years 1 months ago
Hierarchical classification: combining Bayes with SVM
We study hierarchical classification in the general case when an instance could belong to more than one class node in the underlying taxonomy. Experiments done in previous work sh...
Nicolò Cesa-Bianchi, Claudio Gentile, Luca ...
98
Voted
WWW
2008
ACM
16 years 1 months ago
Web graph similarity for anomaly detection (poster)
Web graphs are approximate snapshots of the web, created by search engines. Their creation is an error-prone procedure that relies on the availability of Internet nodes and the fa...
Panagiotis Papadimitriou 0002, Ali Dasdan, Hector ...
115
Voted
SIGMOD
2004
ACM
163views Database» more  SIGMOD 2004»
16 years 1 months ago
FleXPath: Flexible Structure and Full-Text Querying for XML
Querying XML data is a well-explored topic with powerful databasestyle query languages such as XPath and XQuery set to become W3C standards. An equally compelling paradigm for que...
Sihem Amer-Yahia, Laks V. S. Lakshmanan, Shashank ...
113
Voted
GLOBECOM
2009
IEEE
15 years 8 months ago
A Suboptimal Network Utility Maximization Approach for Scalable Multimedia Applications
—Wired and wireless data networks have witnessed an explosive growth of inelastic traffics such as real-time or media streaming applications. Recently, applications relying on l...
Mohammad Sadegh Talebi, Ahmad Khonsari, Mohammad H...