Sciweavers

15088 search results - page 2909 / 3018
» Evaluation of NLP systems
Sort
View
111
Voted
MM
2006
ACM
181views Multimedia» more  MM 2006»
15 years 6 months ago
Towards content-based relevance ranking for video search
Most existing web video search engines index videos by file names, URLs, and surrounding texts. These types of video roughly describe the whole video in an abstract level without ...
Wei Lai, Xian-Sheng Hua, Wei-Ying Ma
109
Voted
MOBICOM
2006
ACM
15 years 6 months ago
On accurate measurement of link quality in multi-hop wireless mesh networks
This paper presents a highly efficient and accurate link-quality measurement framework, called EAR (Efficient and Accurate link-quality monitoR), for multi-hop wireless mesh net...
Kyu-Han Kim, Kang G. Shin
99
Voted
MSWIM
2006
ACM
15 years 6 months ago
An application-driven perspective on wireless sensor network security
Wireless sensor networks (WSNs) have recently attracted a lot of interest due to the range of applications they enable. Unfortunately, WSNs are exposed to numerous security threat...
Eric Sabbah, Adnan Majeed, Kyoung-Don Kang, Ke Liu...
134
Voted
PPOPP
2006
ACM
15 years 6 months ago
Exploiting distributed version concurrency in a transactional memory cluster
We investigate a transactional memory runtime system providing scaling and strong consistency for generic C++ and SQL applications on commodity clusters. We introduce a novel page...
Kaloian Manassiev, Madalin Mihailescu, Cristiana A...
117
Voted
SASN
2006
ACM
15 years 6 months ago
Autonomous and distributed node recovery in wireless sensor networks
Intrusion or misbehaviour detection systems are an important and widely accepted security tool in computer and wireless sensor networks. Their aim is to detect misbehaving or faul...
Mario Strasser, Harald Vogt
« Prev « First page 2909 / 3018 Last » Next »