Sciweavers

10909 search results - page 245 / 2182
» Evaluating Backup Algorithms
Sort
View
ICASSP
2010
IEEE
15 years 4 months ago
Evaluation of a stereo audio data hiding method using inter-channel decorrelator polarity
We extensively evaluated a data hiding algorithm for stereo audio signals which embeds data using the polarity of the echoes added to the high-frequency channels, which we have pr...
Kazuhiro Kondo
ADT
2006
15 years 4 months ago
Characterization and evaluation of TCP and UDP-based transport on real networks
Standard TCP (Reno TCP) does not perform well on fast long distance networks, due to its AIMD congestion control algorithm. In this paper we consider the effectiveness of various a...
Roger Les Cottrell, Saad Ansari, Parakram Khandpur...
CORR
2007
Springer
111views Education» more  CORR 2007»
15 years 4 months ago
Comments on "Design and performance evaluation of load distribution strategies for multiple loads on heterogeneous linear daisy
Min, Veeravalli, and Barlas have proposed strategies to minimize the overall execution time of one or several divisible loads on a heterogeneous linear network, using one or more ...
Matthieu Gallet, Yves Robert, Frédér...
CORR
2007
Springer
77views Education» more  CORR 2007»
15 years 4 months ago
Query Evaluation and Optimization in the Semantic Web
We address the problem of answering Web ontology queries efficiently. An ontology is formalized as a Deductive Ontology Base (DOB), a deductive database that comprises the ontology...
Edna Ruckhaus, Eduardo Ruiz, Maria-Esther Vidal
VLSISP
2008
239views more  VLSISP 2008»
15 years 4 months ago
An Embedded Real-Time Surveillance System: Implementation and Evaluation
This paper presents the design of an embedded automated digital video surveillance system with real-time performance. Hardware accelerators for video segmentation, morphological op...
Fredrik Kristensen, Hugo Hedberg, Hongtu Jiang, Pe...