Sciweavers

8177 search results - page 1425 / 1636
» Detecting System Emulators
Sort
View
ICC
2008
IEEE
143views Communications» more  ICC 2008»
15 years 10 months ago
A Closed-Form Expression for Static Worm-Scanning Strategies
—This work presents a closed-form expression for characterizing the spread of static worm-scanning strategies through a mean-field approximation. Our model can both accurately c...
Zesheng Chen, Chao Chen
ICC
2008
IEEE
127views Communications» more  ICC 2008»
15 years 10 months ago
Pre-Equalization and Precoding Design for Frequency-Selective Fading Channels
— In this paper, we consider the joint transmitter and receiver design problem based on a novel approximate maximum likelihood decision feedback equalizer (A-ML-DFE) over frequen...
Lingyang Song, Are Hjørungnes, Manav R. Bha...
ICDE
2008
IEEE
139views Database» more  ICDE 2008»
15 years 10 months ago
Compact Similarity Joins
— Similarity joins have attracted significant interest, with applications in Geographical Information Systems, astronomy, marketing analyzes, and anomaly detection. However, all...
Brent Bryan, Frederick Eberhardt, Christos Falouts...
ICMCS
2008
IEEE
156views Multimedia» more  ICMCS 2008»
15 years 10 months ago
Human attention model for semantic scene analysis in movies
In this paper, we specifically propose the Weber-Fechner Law-based human attention model for semantic scene analysis in movies. Different from traditional video processing techniq...
Anan Liu, Yongdong Zhang, Yan Song, Dongming Zhang...
ICPP
2008
IEEE
15 years 10 months ago
Scalable Techniques for Transparent Privatization in Software Transactional Memory
—We address the recently recognized privatization problem in software transactional memory (STM) runtimes, and introduce the notion of partially visible reads (PVRs) to heuristic...
Virendra J. Marathe, Michael F. Spear, Michael L. ...
« Prev « First page 1425 / 1636 Last » Next »