Sciweavers

6318 search results - page 1179 / 1264
» Data Leakage Detection
Sort
View
121
Voted
CGO
2006
IEEE
15 years 8 months ago
Selecting Software Phase Markers with Code Structure Analysis
Most programs are repetitive, where similar behavior can be seen at different execution times. Algorithms have been proposed that automatically group similar portions of a program...
Jeremy Lau, Erez Perelman, Brad Calder
ICPP
2006
IEEE
15 years 8 months ago
Improving Spatial Reuse with Collision-Aware DCF in Mobile Ad Hoc Networks
—Carrier sensing is a medium access method widely adopted in wireless communication to protect data transfers from interference. For example, Distributed Coordination Function (D...
Lubo Song, Chansu Yu
MM
2006
ACM
199views Multimedia» more  MM 2006»
15 years 7 months ago
Concept-based electronic health records: opportunities and challenges
Healthcare is a data-rich but information-poor domain. Terabytes of multimedia medical data are being generated on a monthly basis in a typical healthcare organization in order to...
Shahram Ebadollahi, Anni Coden, Michael A. Tanenbl...
MOBICOM
2006
ACM
15 years 7 months ago
Boundary recognition in sensor networks by topological methods
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to bot...
Yue Wang, Jie Gao, Joseph S. B. Mitchell
MM
2005
ACM
250views Multimedia» more  MM 2005»
15 years 7 months ago
An object-based video coding framework for video sequences obtained from static cameras
This paper presents a novel object-based video coding framework for videos obtained from a static camera. As opposed to most existing methods, the proposed method does not require...
Asaad Hakeem, Khurram Shafique, Mubarak Shah
« Prev « First page 1179 / 1264 Last » Next »