Sciweavers

8655 search results - page 1330 / 1731
» Challenges for Trusted Computing
Sort
View
IWQOS
2005
Springer
15 years 9 months ago
A High-Throughput Overlay Multicast Infrastructure with Network Coding
Network coding has been recently proposed in information theory as a new dimension of the information multicast problem that helps achieve optimal transmission rate or cost. End ho...
Mea Wang, Zongpeng Li, Baochun Li
MIDDLEWARE
2005
Springer
15 years 9 months ago
INDISS: Interoperable Discovery System for Networked Services
Abstract. The emergence of handheld devices associated with wireless technologies has introduced new challenges for middleware. First, mobility is becoming a key characteristic; mo...
Yérom-David Bromberg, Valérie Issarn...
NOSSDAV
2005
Springer
15 years 9 months ago
Peer-to-peer internet telephony using SIP
P2P systems inherently have high scalability, robustness and fault tolerance because there is no centralized server and the network self-organizes itself. This is achieved at the ...
Kundan Singh, Henning Schulzrinne
159
Voted
PAKDD
2005
ACM
160views Data Mining» more  PAKDD 2005»
15 years 9 months ago
Improving Mining Quality by Exploiting Data Dependency
The usefulness of the results produced by data mining methods can be critically impaired by several factors such as (1) low quality of data, including errors due to contamination, ...
Fang Chu, Yizhou Wang, Carlo Zaniolo, Douglas Stot...
PCM
2005
Springer
288views Multimedia» more  PCM 2005»
15 years 9 months ago
Adaptive Deinterlacing for Real-Time Applications
In general, motion compensated (MC) deinterlacing algorithms can outperform non-MC (NMC) ones. However, we often prefer to choose the latter due to the considerations of error prop...
Qian Huang, Wen Gao, Debin Zhao, Huifang Sun
« Prev « First page 1330 / 1731 Last » Next »