Sciweavers

5948 search results - page 953 / 1190
» Computing Robust Counter-Strategies
Sort
View
AINA
2008
IEEE
15 years 6 months ago
Disaster Communication Network by Combination of Different Wireless LANs
So far we have developed a disaster information network which is very effective and robust using wireless network. In this paper, we introduce a mobile network for disaster commun...
Kazuo Takahata, Shinya Takada, Yoshitaka Shibata
AVSS
2008
IEEE
15 years 6 months ago
Evaluation of Background Subtraction Algorithms with Post-Processing
Processing a video stream to segment foreground objects from the background is a critical first step in many computer vision applications. Background subtraction (BGS) is a common...
Donovan H. Parks, Sidney Fels
CCGRID
2008
IEEE
15 years 6 months ago
Orchestrating Data-Centric Workflows
When orchestrating data-centric workflows as are commonly found in the sciences, centralised servers can become a bottleneck to the performance of a workflow; output from service i...
Adam Barker, Jon B. Weissman, Jano I. van Hemert
CCS
2008
ACM
15 years 6 months ago
Information leaks in structured peer-to-peer anonymous communication systems
We analyze information leaks in the lookup mechanisms of structured peer-to-peer anonymous communication systems and how these leaks can be used to compromise anonymity. We show t...
Prateek Mittal, Nikita Borisov
CIKM
2008
Springer
15 years 6 months ago
An effective statistical approach to blog post opinion retrieval
Finding opinionated blog posts is still an open problem in information retrieval, as exemplified by the recent TREC blog tracks. Most of the current solutions involve the use of e...
Ben He, Craig Macdonald, Jiyin He, Iadh Ounis