Sciweavers

10909 search results - page 1921 / 2182
» Evaluating Backup Algorithms
Sort
View
ICSE
2012
IEEE-ACM
13 years 7 months ago
Detecting similar software applications
—Although popular text search engines allow users to retrieve similar web pages, source code search engines do not have this feature. Detecting similar applications is a notoriou...
Collin McMillan, Mark Grechanik, Denys Poshyvanyk
WWW
2007
ACM
16 years 5 months ago
Is high-quality vod feasible using P2P swarming?
Peer-to-peer technologies are increasingly becoming the medium of choice for delivering media content, both professional and homegrown, to large user populations. Indeed, current ...
Siddhartha Annapureddy, Saikat Guha, Christos Gkan...

Publication
232views
15 years 3 months ago
Measurement in 802.11 Wireless Networks and its Applications
Ease of deployment, wireless connectivity and ubiquitous mobile on-the-go computing has made the IEEE 802.11 the most widely deployed Wireless Local Area Network (WLAN) sta...
Malik Ahmad Yar Khan
ICCV
2009
IEEE
16 years 9 months ago
Static Multi-Camera Factorization Using Rigid Motion
Camera networks have gained increased importance in recent years. Previous approaches mostly used point correspondences between different camera views to calibrate such systems....
Roland Angst, Marc Pollefeys
156
Voted
CVPR
2004
IEEE
16 years 7 months ago
Learning a Restricted Bayesian Network for Object Detection
Many classes of images have the characteristics of sparse structuring of statistical dependency and the presence of conditional independencies among various groups of variables. S...
Henry Schneiderman
« Prev « First page 1921 / 2182 Last » Next »