Sciweavers

15792 search results - page 2965 / 3159
» Computational Abstraction Steps
Sort
View
SIBGRAPI
2009
IEEE
15 years 7 months ago
Nude Detection in Video Using Bag-of-Visual-Features
Abstract—The ability to filter improper content from multimedia sources based on visual content has important applications, since text-based filters are clearly insufficient a...
Ana Paula Brandão Lopes, Sandra E. F. de Av...
ICDM
2009
IEEE
126views Data Mining» more  ICDM 2009»
15 years 7 months ago
Convex Non-negative Matrix Factorization in the Wild
Abstract—Non-negative matrix factorization (NMF) has recently received a lot of attention in data mining, information retrieval, and computer vision. It factorizes a non-negative...
Christian Thurau, Kristian Kersting, Christian Bau...
ICPP
2009
IEEE
15 years 7 months ago
On Maximum Stability with Enhanced Scalability in High-Churn DHT Deployment
Abstract—When applied in a commercial deployment, DHTbased P2P protocols face a dilemma: although most real-world participants are so unstable that the maintenance overhead is pr...
Junfeng Xie, Zhenhua Li, Guihai Chen, Jie Wu
101
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
Abstract—It is challenging to provide authentication to timecritical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only effi...
Qiyan Wang, Himanshu Khurana, Ying Huang, Klara Na...
119
Voted
IPPS
2009
IEEE
15 years 7 months ago
Network awareness of P2P live streaming applications
Abstract—Early P2P-TV systems have already attracted millions of users, and many new commercial solutions are entering this market. Little information is however available about ...
Delia Ciullo, M.-A. Garcia da Rocha Neta, Á...
« Prev « First page 2965 / 3159 Last » Next »