Sciweavers

5948 search results - page 1117 / 1190
» Computing Robust Counter-Strategies
Sort
View
SIBGRAPI
2009
IEEE
15 years 4 months ago
Nude Detection in Video Using Bag-of-Visual-Features
Abstract—The ability to filter improper content from multimedia sources based on visual content has important applications, since text-based filters are clearly insufficient a...
Ana Paula Brandão Lopes, Sandra E. F. de Av...
SIBGRAPI
2009
IEEE
15 years 4 months ago
Detecting Buildings in Historical Photographs Using Bag-of-Keypoints
—The strategies for the preservation of historical documents can include their digitization, which is an effective way to make them publicly available while preventing degradatio...
Natalia C. Batista, Ana Paula Brandão Lopes...
INFOCOM
2009
IEEE
15 years 4 months ago
Time Valid One-Time Signature for Time-Critical Multicast Data Authentication
Abstract—It is challenging to provide authentication to timecritical multicast data, where low end-to-end delay is of crucial importance. Consequently, it requires not only effi...
Qiyan Wang, Himanshu Khurana, Ying Huang, Klara Na...
LICS
2009
IEEE
15 years 4 months ago
Expressiveness and Closure Properties for Quantitative Languages
Weighted automata are nondeterministic automata with numerical weights on transitions. They can define quantitative languages L that assign to each word w a real number L(w). In ...
Krishnendu Chatterjee, Laurent Doyen, Thomas A. He...
ASMTA
2009
Springer
104views Mathematics» more  ASMTA 2009»
15 years 4 months ago
Preliminary Results on a Simple Approach to G/G/c-Like Queues
In this paper we consider a multi-server queue with a near general arrival process (represented as an arbitrary state-dependent Coxian distribution), a near general state-dependent...
Alexandre Brandwajn, Thomas Begin
« Prev « First page 1117 / 1190 Last » Next »