Sciweavers

1192 search results - page 104 / 239
» Computing Weakest Readings
Sort
View
NDSS
2009
IEEE
15 years 10 months ago
The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted s...
Peter Williams, Radu Sion, Dennis Shasha
138
Voted
CLUSTER
2008
IEEE
15 years 10 months ago
Enabling lock-free concurrent fine-grain access to massive distributed data: Application to supernovae detection
—We consider the problem of efficiently managing massive data in a large-scale distributed environment. We consider data strings of size in the order of Terabytes, shared and ac...
Bogdan Nicolae, Gabriel Antoniu, Luc Bougé
ICNSC
2008
IEEE
15 years 10 months ago
Mining the Royal Portrait Miniature for the Art Historical Context
— the eleventh-century royal portrait miniature painting of King Gagik-Abas of Kars, Queen Goranduxt, and Princess Marem is an important image within the realm of Armenian art hi...
Steve Read, Yu Cao, Hazel Antaramian-Hofman
119
Voted
ICPR
2008
IEEE
15 years 10 months ago
A cascade detector for text detection in natural scene images
In this paper, we present a text detection and localization method. Our detection technique is based on a cascade of boosted ensemble and localizer uses standard image processing ...
Shehzad Muhammad Hanif, Lionel Prevost, Pablo Negr...
110
Voted
ICPR
2008
IEEE
15 years 10 months ago
Static text region detection in video sequences using color and orientation consistencies
Motion compensated error of the static text in the frame rate conversion (FRC) is most annoying artifact because people cannot read it. In this paper, we present a novel static te...
Daehyun Kim, Kwanghoon Sohn